Critical Guide to Venezuelan State Media Operations

TeleSUR English’s Poor Bolsonaro Analogy and their Partners in Messaging

Real Nudes with False Attribution to Delegitimize Female Politicians and their Husbands

Bolivarian News Networks Spreading Anti-Christian Disinformation in Defense of Evo Morales

Viral Libel Against Police: Manufacturing Indignation in Chile through Coordinated Inauthentic Behavior

Operation InfeKtion: How Russia Perfected the Art of War + It’s Relation to Bolivarianism

TeleSUR: A Case Study in Unethical Journalism

TeleSUR or TellaSLUR?: Anti-Zionist News, Anti-Semitic Coordinated Inauthentic Behavior

“Venezuela’s PSUV is a Fascist Political Party and Nicolas Maduro is a Hitler Want-to-be.” – Chris Hedges*

Silence of the Professors: Mark Crispin Miller

Correcting Ben Norton’s Retweet Commentary of Newsweek

When a YouTube Chat Turns to “Ciao!”: On the Cowardice of Caleb Maupin

Occupy Unmasked: Steve Bannon, Andrew Breitbart & Evidence of Foreign Influence in OWS

While Russia’s SciHub Subliminally Spreads Socialism, GrayZone Spreads Stupidity

TeleSUR English Related Research YouTube List

WSWS: Coordinated Inauthentic Behavior, Unethical Journalism, Fundraising Fraud

On Social Media’s False Democratic Promise: Virality, Newsworthiness, and Propaganda

Algorithms, Authenticity, and Coordinated, Inauthentic Behavior: A Case Study in Caitlin Johnstone

The Movement of Movements Thesis: Invisibility Mapping and the Connection Between Venezuela and Antifa

Kultural Marxism: Digital Evidence of Venezuela’s Attempt to Influence American Elections

Censorship or Community Standards?: An Evidence based Answer to the Question of “Why Did Facebook Purge TeleSUR English?” 

Orwellian Irony: A Case Study in TeleSUR English Editorial Aesthetics

Potential Book Titles on Venezuela’s Intelligence Operations in America

Cultural Marxism vs. Kultural Marxism

Cultural Marxism in America: A Historic Overview of its Origins

TeleSUR English: Junk News, Fake News and Russian Propaganda

TeleSUR – Working Directory of Associates

Abstract for Marxist Reading Group Conference

Dinero por Preguntas Respondidas Sobre TeleSUR, el Ministerio del Poder Popular para Comunicación e Información, el Ministerio Público, y la Contraloría General de la Repúblic

Money for Questions Answered about TeleSUR, The Ministry of Popular Power for Communication and Information, The Public Ministry, and the Office of the Comptroller General of the Republic

TeleSUR English: Onsite Audit Overview

TeleSUR English: Ciudadano teleSUR or Ten Cuidado Con TeleSUR?

 

TeleSUR English: Facebook Bot Network and The Case for Resetting Their Follower Numbers

TeleSUR English: Appalling App Adoption and Security Settings

TeleSUR English: Lying, Misleading, Useless and Ugly Infographic

TeleSUR English: Elitism, Non-Engagement and Fake Followers

TeleSUR English: Bibliography

Foro de São Paulo Forum Slogans: Another World is Possible

Foro de São Paulo

President Donald Trump, Civic Responsibility and Espionage: A Case Study in Fake News and Political Polarization Promoted by Venezuela

Debunking Richard Wolff’s Debunking of Jordan Peterson’s “Cultural Marxism”

Russian AND Venezuelan Bots; and How I’m Ahead of my Time

TeleSUR Employees Who’ve Refused to Answer my Questions

Why I Write: To Avoid Criminal Charges

Definitions, Laws and Precedent: An FARA Amicus Curiae for the DOJ

Cultural Analysis

Pusha T’s Daytona as Confession of Collaboration with Venezuela’s Cartel of the Suns

Is Killer Mike’s Trigger Warning Venezuelan Propaganda? A Historical Media Analysis of PanAfricanist Digital Media

Trigger Warning and the Radical Atlanta-Caracas Axis

Collected English-Translation Poems of Jesus Santrich

 

Review of Red Cocaine: The Drugging of America

Review of “Venezuela in Light of Anti-American Parties and Affiliations in Latin America”

 

English Translations from Spanish

“Union Leadership and Prostitution in El Alto, Bolivia” by Franco Limbe

“Ex-FARC fighters say: “Former President Correa was funded by Raúl Reyes and Jojoy.”

 

Notes on European Guide to Good Practice in Knowledge Management – Part 1: Knowledge Management Framework

Successful KM implementations in business settings prioritize attention on soft issues – including human and cultural aspects, personal motivations, change management methodologies, new and improved business processes enabling multidisciplinary knowledge sharing, communication and collaboration – and see technology as an enabler. 

Despite this, most efforts so far at addressing the challenge of KM in business environments have typically taken a “technology-push” approach, concentrating major effort on putting in place IT tools that will “solve the knowledge creation, sharing and reuse problem”. 

The overall intention has been to provide meaningful and useful guidelines to companies, and notably SMEs (see below), as to how they might align their organizations culturally and socially to take advantage of the opportunities of knowledge sharing within and beyond their organizational boundaries. 

If the Framework helps an organization achieve a common understanding of KM, align and focus its actions, identify what KM aspects are relevant to that organization, understand what is the right combination of these aspects, which processes should be tackled and how to develop KM both an organizational and individual level – then it has value. 

Why KM in SMEs? 

Owners and managers of SMEs differ in what they term success. Survival and continuity, profit, return on capital employed, numbers of employees and customers, pride in product, skills and service, employment for family members, and enjoyable work life, are frequently mentioned criteria. 

This European KM Framework is designed to promote a common European understanding of KM, show the value of the emerging KM approach and help organizations towards its successful implementation. 

The Framework should be considered as a starting point for developing, if appropriate, an organization-specific framework that serves best the needs of a particular organization’s KM approach. 

The KM Framework considers three layers as most important for KM: 

a)  The business focus should be in the centre of any KM initiative and represents the value-adding processes of an organization, which may typically include strategy development, product/service innovation and development, manufacturing and service delivery, sales and customer support.

b)  Five core knowledge activities have been identified as most widely used by organizations in Europe: identify, create, store, share and use.

c) The enablers represent the third layer and comprise two main categories, called personal and organizational knowledge capabilities, which complement each other. These capabilities should be seen as the enablers for the knowledge activities outlined above. 

Core value-adding processes

In addition to supporting the improvement of the core processes of an organization, KM methods can also be applied within its supporting processes: competence management is one such example from the HR arena; developing best practice databases to capture and exchange knowledge about optimum procedures throughout the organization is another example from the area of continuous improvement processes; methods for intellectual property management (e.g. patents, copyrights) is a further example from the area of management of financial and non-financial assets. 

Small and medium sized enterprises(SMEs) in particular are increasingly building networks to supply their products, to share their resources and to learn from each other. Long-term partnerships are established in order to develop new products and services that a single organization could not cope with alone. Therefore partners and suppliers, as well as clients, should often be involved within the scope 

Empirical research, practical experiences and the analysis of more than 150 KM frameworks worldwide have shown that the following areas are, in most cases, the most important to address: 

1. describe how knowledge is used
2. raise awareness about the required KM activities
3. reduce complexity
4. design a KM solution.

The five core knowledge activities are: 

  • Identify knowledge
  • Create New Knowledge
  • Store Knowledge
  • Share Knowledge
  • Use Knowledge

Two important requirements have to be fulfilled to achieve improvements from these core knowledge activities: 

  • First, the core activities have to be aligned or integrated into the organizational processes and daily tasks.
  • Second, the core activities have to be carefully balanced in accordance with the specificities of each business process and organization. A KM solution should not focus only on one or two activities in isolation.

4.1 Personal knowledge capabilities 

the following personal knowledge capabilities are usually required for a successful implementation of a KM solution: 

  • a)  Ambition;
  • b)  Skills;
  • c)  Behaviour;
  • d)  Methods, T ools and T echniques;
  • e)  Time management;
  • f)  Personal knowledge.

Just asking simple questions like… 

  • Is there somebody else who might have knowledge that could help me further here? 
  • What did we learn in this project? 
  • With whom should we share what we learn?
    …could have a significant impact on the way knowledge is developed, shared and used in an organization. 

An often-used saying related to KM is “an hour of work in the library could save you a month of work …”. 

Research indicates that the pressures of knowledge-based work are increasing in modern societies. These can include the need to solve unforeseen problems, taking greater levels of personal self-responsibility and decision-making, carrying out more coordination tasks in cooperative work settings, a greater number of information processing tasks and a higher dependency on the speed of input from colleagues and clients. 

Organizational knowledge capabilities 

Organizational knowledge capabilities describe the conditions that the leadership of an organization has to establish in order to facilitate effective knowledge use within its value-adding processes, by its managers, employees and other stakeholders. 

The following organizational knowledge capabilities are typically relevant for a successful implementation of a KM solution: 

  • g)  Mission, Vision & Strategy; 
  • h)  Culture; 
  • i)  Process & Organization; 
  • j)  Measurement; 
  • k)  Technology & Infrastructure; 
  • l)  Knowledge Assets.

Culture 

Since most knowledge processes are on a more or less voluntary basis and knowledge is to a large degree personal, there needs to be within an organization a culture of motivation, a sense of belonging, empowerment, trust and respect before people really start to engage themselves in developing, sharing and using knowledge. It requires a culture in which people are respected, based on the knowledge they have and the way they are putting it to use for the organization. 

4.2.6 Knowledge Assets 

The biggest challenge for any organization is to develop and make optimal use of the employees’ knowledge (their so-called “human capital”) and that of their external stakeholders (their so-called “customer capital”) by transforming this know-how into shared knowledge assets (so-called “structural capital”). Knowledge assets are those , which remain with the company when the employees walk out through the door –such as manuals, customer databases, process descriptions, patents etc. Typically, human capital is more related to the internal or tacit component of knowledge (experience, skills, attitude) and structural capital more related to explicit information. 

Notes from European Guide to Good Practice in Knowledge Management – Part 5: Knowledge Management Terminology

European Guide to good Practice in Knowledge Management – Part 5: KM Terminology 

Best/Good Practices: KM practices that have produced outstanding results in other situations, inside or outside of a particular organization and which can be validated, codified and shared with others and recommended as models to follow. 

Chief Knowledge Officer (CKO): The individual with overall leadership of KM in an organization. Typically, the CKO will articulate and champion the KM vision, provide leadership for implementing and sustaining KM initiatives, and has the ultimate responsibility for knowledge creation, sharing and application. 

Community of Practice (CoP): Informal, self-organized, collaboration of people, within or between organizations, who share common practices, interests or aims. When the CoP proves useful to its members over time, they may formalize its status by adopting a group name and a regular system of interchange through enabling tools. (Other types of KM communities include Communities of Interest and Communities of Purpose). 

Core Competences: The set of skills, experience and attributes recognized by an organization as critical to their success in KM. – for example: information literacy, a sharing culture etc. 

Customer Capital: Refers to the value of an organization’s network of satisfied clients, and their loyalty to the organization. 

Data: Discrete, objective facts (numbers, symbols, figures) without context and interpretation. 

Explicit Knowledge: Individual and collective knowledge that has been codified, typically in objects, words, and numbers, in the form of graphics, drawings, specifications, manuals, procedures etc. and can therefore be easily shared and understood. 

Human Capital: Describes the value of the know-how and competencies of an organization’s employees. An organization which systematically develops its Human Capital is more likely to become a successful learning organization (see definition 23). 

nformation: Is based on data, and adds value to the understanding of a subject and in context, is the basis for knowledge. 

Information Management: Covers the processes of selecting, capturing, categorizing, indexing and storing information. Typically this involves active and continuous review of content stored in, or distributed through a range of tools (databases, taxonomies (see definition 30), human networks etc). 

Intangible Assets: Assets that can have a great value to an organization, but which typically have no physical presence and have traditionally not been recognized from a financial perspective, except when sometimes grouped together as “goodwill” on balance sheets. Comprises assets such as reputation, brand value, monopoly rights and other non-balance sheet items such as “potential” –i.e. the capacity to generate competitive advantage in the future. 

Intellectual Capital: Intellectual Capital (IC), a subset of the intangible assets (see definition 11) is commonly accepted to include three sub-categories: Human Capital, Structural Capital, Customer Capital (see definitions [8, 28 and 5 respectively). IC can include the knowledge of employees, data and information about processes, experts, products, customers and competitors; and intellectual property such as patents or regulatory licenses. 

Knowledge: A set of data and information (when seen from an Information Technology point of view), and a combination of, for example know-how, experience, emotion, believes, values, ideas, intuition, curiosity, motivation, learning styles, attitude, ability to trust, ability to deal with complexity, ability to synthesize, openness, networking skills, communication skills, attitude to risk and entrepreneurial spirit to result in a valuable asset which can be used to improve the capacity to act and support decision making. Knowledge may be explicit and/or tacit (see definitions 7 and 29 respectively), individual and/or collective. 

Knowledge Audit: A systematic review, typically based on questionnaires, interviews or narrative techniques, of the knowledge within an organization. Often also includes a mapping of knowledge interactions and flows within and between organizations, teams and individuals. 

Knowledge-Based Economy: A recently coined term that refers to the stage of economic evolution in which knowledge is considered as the key factor of production and competitiveness. This major change has significant implications for the strategy, operations, and structure of all types of organization, large or small, public or private, commercial, not-for-profit or academic. 

Knowledge Management (KM): Planned and ongoing management of activities and processes for leveraging knowledge to enhance competitiveness through better use and creation of individual and collective knowledge resources. 

KM Framework: Describes the most essential factors (assets, people, processes, tools) influencing the success or failure of a KM initiative, and their interdependent relationships. Typically, a framework is built up into a pictorial representation which serves as an aide-memoire for implementing KM within an organization, helping users to position individual KM initiatives with within a wider context (see also booklet 1 of this CEN guide). 

Knowledge Life Cycle: Describes the principle phases of managing knowledge, such as selecting, maintaining, measuring, sharing and applying knowledge in given contexts. 

KM Measurement: One of the KM life cycle phases (see definition 18) Aims to help organizations measure the value created by their KM projects, programmes and strategies. For example, measuring return on investment in KM is often possible through a range of both quantitative and qualitative techniques (see also booklet 4 of this CEN guide). 

KM Roles: To implement KM successfully sometimes requires specific and clearly- defined roles. These are not always formal, but can include such roles as CKO (see definition 2), content managers, change management experts, knowledge brokers and harvesters etc. 

KM Strategy: A declaration of how the organization will use KM methods, tools, processes, and practices to achieve business objectives by leveraging its content, people and processes and how KM will support the organization’s overall strategy. 

KM Tools: The generic sets of tools that enable implementation of KM processes. These can be either IT systems (e.g. databases, intranets, extranets, portals), or methodologies, or human networks (e.g. CoPs – see definition 3). 

Learning Organization: An organization that views its future competitive advantage as based on continuous learning and use of knowledge and an ability to adapt its behaviour to changing circumstances. 

Narrative Techniques: Techniques employed in the context of KM to describe complicated issues, explain events, communicate lessons learned, or bring about cultural change (see also booklet 2 of this CEN guide). Such techniques include oral story-telling, drama and some styles of written knowledge capture., which can richness to communication and carry more complex messages and sub-text than non-narrative techniques. 

Organizational Culture: The way of perceiving, thinking and feeling, shared and transmitted among organizational members. Often referred to as: “the way things are done around here” (see also booklet 2 of this CEN guide). 

Organizational KM: Unlike personal KM (see definition 27), which centres on the individual, organizational KM depends upon an enterprise-wide strategic decision to actively manage knowledge through a range of processes, tools and people. 

Personal KM: A set of concepts, disciplines and tools for organizing often previously unstructured knowledge, to help individuals take responsibility for what they know and who they know. 

Structural Capital: Describes the knowledge that has been captured and institutionalised within the structure, processes and culture of an organization. SC is a subset of explicit knowledge (see definition 7). It could include patents, copyrights, proprietary software, trademarks, trade secrets etc. It can be stored in the form of documented procedures, databases, expert systems, decision-support software and KM systems. SC is everything left at the office when the employees go home, and can clearly be regarded as an organization’s property.

Tacit Knowledge: Tacit knowledge (sometimes also called implicit knowledge) consists of mental models, behaviours and perspectives, largely based on experience. This knowledge is difficult to codify, but KM techniques such as learning by doing or collaboration between communities (see definition 3) can help people to share this knowledge.

Taxonomy: An outcome from knowledge mapping and structuring processes. A taxonomy is a hierarchical classification which helps users understand how explicit knowledge can be grouped and categorized. A good taxonomy helps users of knowledge by improving their search and retrieval experiences. 

Notes from European Guide to Good Practices in Knowledge Management – Part 2: Organizational Culture 

You can read the entire European Guide to Good Practice in Knowledge Management – Part 2 Organizational Culture here.

Below are some of the passages I found most valuable.

*

Culture is perhaps the most important factor in successfully managing knowledge. It is a key influence on behaviours. This booklet looks at what culture is, how it develops and how you can work with it to ensure your KM programme is successful. It attempts to give some answers to:

1)  How to get the support and active involvement of the members of the organization (issues related to human resources: motivation, competencies, etc). 

2)  How to organize for the implementation of KM (issues related to the formal and informal structure of the organization). 

3)  How to get the appropriate climate for KM implementation (issues related to specific activities and tools to be used). 

Organizations, even small and medium-sized enterprises (SMEs), rarely involve a single culture; there will be subcultures (groups which exhibit cultural characteristics, i.e. values, norms and practices that differ from the main organizational culture and from other subcultures). One common manifestation is “departmental differences”, which can lead to the phenomenon of departmentalization or so-called “silo thinking”.

There are personal, team and organizational ‘agendas’ containing conflicting aspirations. This gives rise to the complexity of human relationships in organizations and organizations’ behaviour as so-called “complex adaptive systems”. 

Individuals employment puts them in a contractual relationship in which there are expectations and responsibilities. Individuals’ “psychological contract” (i.e. their beliefs about what they owe the organization and what the organization owes them) drives them to seek, to find and to modify the culture to better serve their psychological contract. This does not necessarily imply a selfish or self-seeking motive. Public service, duty, or care for others may well be a strong value within the individual, group, or organization. The more supportive the culture the more productivity, trusting and sharing will be exhibited by individuals. 

People’s identity is fundamental to their motivation and commitment. It drives what they feel is important knowledge, what, how and with whom they will share that knowledge and how they value their contribution to colleagues and the organization. It is important when mapping knowledge to identify those people whose self- worth is related to being perceived as key personnel in knowledge flows.

Managing the boundaries between individual and corporate knowledge requires negotiation and high emotional intelligence, particularly if tacit knowledge is to be exchanged, and for KM tools such as expertise directories or “lessons learned” to be comprehensive. 

Some obstructive properties of groupthink include the following:

• Illusion of invulnerability: members believe that past successes guarantee future successes and so take extreme risks.
• Collective rationalization: members collectively rationalize away information that contradicts their assumptions.
• Illusion of morality: members believe that they are all moral and so could not make a bad decision.
• Shared stereotypes: members dismiss evidence that is contradictory by discrediting the source of that information.
• Direct pressure: sanctions are placed on members who dissent from the majority opinion by, for example, using assertive language to enforce compliance.
• Self-censorship: members keep quiet about any misgivings they have so that they do not voice concerns.
• “Mind guards”: members screen out information from outsiders where this might challenge the group’s assumptions and beliefs.
• Illusion of unanimity: given these other symptoms, it appears that there is consensus within the group, even though there may be many of those involved who do not agree with the group decision.

There are three common types of community, which can be found both within an organization and across organizations:

• Communities of interest are groups with a mutual interest in a particular topic whose members wish to learn more and further develop their interest in the subject.
• Communities of Practice (CoPs) bring together people to share insights, develop expertise and to foster good practice through the exchange and creation of knowledge in a specific area. They are often a focus for building specific capability in their organization and ensuring that this is protected and retained in the organization as people move on. Formal functions (e.g. Finance, Marketing, Human Resources) often offer excellent potential for inter-organizational CoPs. 
• Communities of purpose have a shorter time horizon and are accountable for delivering a specific business goal. These could include project teams, steering groups and task forces.

When individuals are asked to introduce their knowledge into an organizational system, e.g. a client database, they often tend to think that they have lost the ownership of know-how that until then remained exclusive to them. The objectives set for KM in the organization therefore need to take into account the rules and habits concerning the ownership and control of specific knowledge, in order to encourage the transition from personal to organizational knowledge. 

A positive experience normally means that there has been a positive and important gain for the individual; it might be increased credibility, recognition, monetary or promotional reward etc. 

There are two main categories of trust, personal trust and competence (or identity) based trust. For effective KM it does not need to be at the level of personal trust, but can be competence-based. So it can take a number of forms: 

• Identity based – I trust you because of your role or position – e.g. a doctor. 

• Reciprocity based – I engage in trust behaviour because I believe you will too.
• Elicitative Trust – By engaging in acts of trust I will elicit trust from the other person.
• Compensatory trust – Some, but not all, will fail to engage in the needed behaviour and therefore I must take a lead.
• Moralistic Trust – I will act in a trustworthy way irrespective of what others do.

Leaders should provide purpose, direction and behavioral role models. They share ideas with, walk among and listen to members of the enterprise, customizing the message and sensing employees’ understanding of the enterprise’s direction. These qualities are important at all levels in the organization, but have more impact the higher the position held. Management involves interpreting the enterprise vision and mission in a way that makes sense and resonates with employees. Managers guide performance and offer suggestions for corrective action. KM frequently involves guiding people’s actions rather than directing; managers therefore need the skills and competences to create a climate that fosters the creation, sharing, and application of knowledge; i.e. a broader basis of leadership skills.

Credibility is strongly related to trust and qualities of leadership, both already recognized as fundamental to a knowledge–enabled organization.

• High credibility and reliability means that when you give advice or make a judgment on your area of credible expertise it is based on sound knowledge or wisdom;
• People in the organization know that when you say something will happen, it will;
• People in the organization know that when you say something will not happen, it will not;
• People accept that you have the necessary judgment, skill and insight to be able to choose correctly between what should and should not happen;
• People accept that you have the necessary backing, levers of influence, resources and if necessary weapons at your disposal to ensure certainty of chosen outcome, once determined;
• When you obtain agreement or commitment from them to deliver something, they know they have to deliver it.

For a KM intervention to succeed, those involved must feel it is important enough that they must participate, that mistakes made in learning will be accepted and that time for change will be allowed.

In a consulting company, where the members of the organization viewed knowledge as their personal possession, and therefore refused to share, the management team encouraged knowledge sharing by changing the new project allocation process. Rather than giving projects to individual consultants, they were given to a group of consultants with the necessary expertise, forcing the consultants to network and market their expertise internally to participate on projects. Only by getting invited to join new projects could they be rewarded, thus giving them a built-in incentive to advertise their expertise internally. As a result the competition for status drove knowledge sharing rather than hoarding.

The iterative process for knowledge creation involves:

Empathizing – sharing and developing ideas together through social exchange 

Articulating – into explicit form

Connecting – using different explicit forms to help the idea move forward 

Embodying- incorporating into a product/process/service that has value.

Part of your KM program should therefore involve mapping existing competencies, e.g. by means of “knowledge skill tests” and deciding what to do about those that are missing, by offering training or including learning by doing programs in the organization. 

For sharing knowledge to become a cultural norm, the benefits of sharing must exceed the benefits of retention in the eyes of the individuals concerned. This may mean that they are better known and get invited to do more interesting work, or are more visible (e.g. leading to promotion), or enjoy being helpful to others, or receive rewards etc. Individual preferences will suggest what sort of benefits will be important for any one individual. 

One electronics company developed a so-called “virtual Hollywood“ and asked “directors” (employees) to present “scripts” (improvement ideas) to “investors” (general managers) who would choose the ones to “produce” (implement). The project promoted out-of-the-box thinking and in the first year generated over 200 submissions, addressing process improvement and product development.

A learning organization is an organization creating, acquiring and transferring competence and being able to change its behavior according to new knowledge and views. (Garvin, 1993)

What does a learning organization learn?

• To use learning to reach its goals.
• To help people value the effects of their learning upon their organization.
• To avoid making the same mistakes again.
• To share information in ways that prompt appropriate action.
• To link individual performance with organizational performance.
• To tie rewards to key measures of performance.
• To take in a lot of environmental information at all times.
• To create structures and procedures that support the learning process.
• To foster ongoing and orderly dialogues.
• To make it safe for people to share openly and take risks.

What does a learning organization look like?
• Learns collaboratively, open and across boundaries.
• Values how it learns as well as what it learns.
• Invests in staying ahead of the learning curve in its industry.
• Gains a competitive edge by learning faster and smarter than competitors.
• Turns data into useful knowledge quickly and at the right time and place.
• Enables every employee to feel that every experience provides him/her a chance to learn something potentially useful, even if only for leveraging future learning.
• Exhibits little fear and defensiveness.
• Takes risks but avoids jeopardizing the basic security of the organization.
• Invests in experimental and seemingly tangential learning (related but not conforming to existing learning patterns) and in serendipity.
• Supports people and teams who want to pursue action-learning projects.
• Depoliticizes learning by not penalizing individuals and groups for sharing information and conclusions.

How does a learning organization evolve? By…

• Questioning current assumptions about learning.
• Getting an outside perspective.
• Tying the goal of becoming a learning company to organizational vision.
• Funding or creating a champion in top management.
• Looking for the `pain’ in the organization – the place(s) where more effective learning could help.
• Articulating learning organization ideas plainly.
• Rewarding group as well as individual learning success and failure.
• Finding an external competitor or other focus point to spur greater co-operative learning.
• Finding ways to collaborate internally, unhampered by boundaries.

In order to drive the community forward one should consider:

• Identifying or electing a coordinator.
• Establishing the community infrastructure – tools available to support interaction between community members – such as e-mail, discussion groups, an intranet, other tools to build/share knowledge resources.
• A launch aimed at attracting potential members, securing commitment, agreeing initial priorities and actions and consolidating the active members.
• Move into ongoing community operation, ensuring that the steering group, the sponsor and the community coordinator work with members to deliver the community’s goals.
• Evaluate outcomes, celebrate and communicate success within and outside the community, in order to keep interest and energy levels high.

The process of creating a community cannot be rushed because some self-adjusting mechanisms first need to be put in place, in order to make the community robust. The general stages that communities go through are:

• Excitement when forming – something new
• Confusion – about the purpose
• Clarification – who is to do what
• Growing – trust and respect building up
• Arrival – the community is self-directing.

Mentoring involves matching new or inexperienced employees with more experienced senior personnel, so that the intangible, tacit knowledge of an industry or organization can be passed on effectively. It allows the newer employees to grow without necessarily just learning the hard way and should create a bond between mentor and protégé. This technique can be particularly useful for organizations with a substantial proportion of employees approaching retirement age, or where there are steep learning curves, or high turnover rates.

When researching, designing, implementing or evaluating any KM program, consider using story, since it can:

• Enable organizations to value, capture and translate individual experiences into a shared resource (lessons learned).

• Develop a culture that values rich, effective and meaningful dialogue both in conversation and in records.
• Develop tools and techniques to capitalize on project team experiences.
• Explore roles and relationships.
• Tangible objects provide meaningful ‘hooks’, thereby stimulating the creation of new meanings, communities and memories.
• Provide the ‘cultural glue’ for communities and networks.
• Help explore the risks and opportunities presented by any KM experience.

Dialogue, rather than discussion, usually provides the best environment for surfacing true experiences safely and dealing with them. Therefore an environment that encourages dialogue must establish ground rules for behavior. It requires those involved to be willing to work towards co-creating an outcome and a willingness to listen without provoking justification or defensiveness. 

Each community is a subculture within an organization which has developed its own cultural norms. These norms encourage or limit the acceptance of processes, technology or trust-based relationships. The experience of using technology can affect the norms of the community. The implementation of technology provides experiences for the individuals within the community and their experiences thereby modify the cultural norms. If the experience is beneficial the move towards a knowledge sharing culture is enhanced. If the experience is frustrating, more difficult than existing methods, or in other ways unrewarding, it will be seen as detrimental.

Notes On Designing an Integrated Methodology for Knowledge Management Strategic Planning: The Roadmap Toward Strategic Alignment 

 

The main aim of the study is to develop a new methodology for KM strategic planning to navigate KM projects strategically. The mixed-method approach was used to develop KM strategic planning methodology. 

The main focus of the proposed methodology is KM strategic alignment by considering internal and external environment of business and adopting a top-down approach in strategic planning which was less seen in the previous studies. 

The proposed methodology helps organizations to know what processes and activities must be emphasized in KM project adoption. Application of the proposed integrated methodology assists organizations to gain strategic alignment and fit KM investment with a business requirement. 

the proposed methodology is general in nature; it is recommended to develop customized KM strategic methodologies in specific domains, for example, public organization, SCM and virtual organization. 

The majority of investments in the field of KM do not meet organizations’ knowledge needs and expected benefits, and therefore, it leads to loss of investments (Ale et al., 2014). Some of the important reasons for the failure of KM projects are the lack of an appropriate roadmap or methodology to implement KM initiatives (Kim et al., 2003; Wiig, 1998; Bolisani and Scarso, 2015), the lack of clear distinction between data, information and knowledge, ignorance of unique features of knowledge and knowledge workers (Kim et al., 2003), lack of clear KM strategies and vision (Beiryaei and Jamporazmay, 2010; Martinsons et al., 2017), lack of KM strategic alignment (Martinsons et al., 2017) and ignorance of consequences of KM (Lopez-Nicolás and Meroño-Cerdán, 2011). Many organizations use IT planning techniques to identify the core knowledge, design KM procedures and implement KM, while KM cannot rely solely on technical approaches because of the multi-dimensional nature of KM (Akram et al., 2015). This challenge reveals the necessity of a specialized strategic planning methodology for KM 

one of the most cited KM failure reasons is the lack of strategic planning and poor strategic alignment of these initiatives (Shankar et al., 2003; Ale et al., 2014; Patil and Kant, 2014; Bolisani and Scarso, 2015). Considering that strategic alignment and strategic planning are regarded as the primary requirements of successful KM implementation (Ale et al., 2014; Beiryaei and Jamporazmay, 2010), the main purpose of this paper is to develop a new integrated methodology for KM strategic planning which could be applied as a roadmap for implementation of knowledge initiatives with a strategic approach. 

KM is defined as the process of identifying, creating, absorbing and applying organizational knowledge to exploit new opportunities and enhance productivity 

KM barriers were grouped in five categories, including knowledge characteristics, knowledge source, knowledge receiver, contextual factor and mechanisms. Patil and Kant (2014) believed that KM barriers can be grouped in strategic barriers, organizational barriers, technological barriers, cultural barriers and individual barriers. They found that strategic barriers were the most important barriers to KM adaptation. 

KM strategy is the high-level plan which identifies KM processes, tools and infrastructures and guarantees the effective circulation of knowledge in the organizations. 

On the KM focus dimension, KM strategies can be grouped as explicit- oriented and tacit-oriented. On the other dimension, KM strategies can be categorized as internal orientation and external orientation. 

Selecting the appropriate KM strategy by considering organizational conditions and business knowledge requirements is a core concern of KM strategic planning methodologies. 

Strategic planning of KMS has been important for the following reasons:

better support for business objects
enhancement of integration and consolidation of KMS
appropriate use of KMS to get competitive advantage
prioritization of KMS development projects
better executive supports of KMS operations
decision-making facilitation related to KMS investments
improvement of resource allocation in KM area
prediction of needed resources
improvement of the communication with top managers
identification of key problematic areas

  • According to APQC’s KM strategic planning methodology, there are seven steps to KM strategic planning success: 
    • (1)  establish organizational goals and strategic objectives for KM; 
    • (2)  identify KM strategies (that support those goals and objectives); 
    • (3)  identify KM priorities;
    • (4)  confirm the scope for each strategy; 
    • (5)  identify the roles needed and skill requirements for those roles;
      (6)  define measures and expectations; and
      (7)  assess critical success factors, gaps and potential risks

The first phases of the integrated methodology include internal and external environment analysis of business and KM, which these strategic practices were emphasized by Kim et al. (2003), Beiryaei and Jamporazmay (2010) and Martinsons et al. (2017). 

The second main phase is KM strategic orientation which is mentioned by strategic researchers in strategic management and IS strategic planning (Hoque et al., 2016). This phase encompasses activities such as setting KM vision, setting KM mission, identifying strategic knowledge gap, prioritizing knowledge-oriented processes and identifying KM strategy. 

The third main phase is KM strategy implementation which is an important phase in strategic planning approaches (Hashim et al., 2015). In this phase, some activities like allocating the KM resources, identifying appropriate KM mechanism, identifying KM processes and developing detailed action plan must be performed to implement strategic formulation in the previous stage. 

The last phase of the KM strategic planning methodology is KM strategic control which is considered as the vital phase of the most strategic model (Wiig, 1998). This phase encompasses activities such as identifying Key Performance Indicators (KPIs), evaluation scheduling, reviewing strategic priorities regarding the emerging changes and taking corrective actions. 

References

Abou-Zeid, E.S. (2009), “Alignment of business and knowledge management KM strategy”, Encyclopedia of Information Science and Technology, 2nd ed., Information Science Reference, Hershey, PA, pp. 124-129. doi: 10.4018/978-1-60566-026-4.ch022.

Abu Bakar, A.H., Yusof, M.N., Tufail, M.A. and Virgiyanti, W. (2016), “Effect of knowledge management KM on growth performance in construction industry”, Management Decision, Vol. 54 No. 3, pp. 735-749.

Aidemark, J. (2007), “Strategic planning of knowledge management systems: a problem exploration approach”, Doctoral dissertation, Institutionen för data-och systemvetenskap (tills m KTH).

Ajmal, M., Helo, P. and Kekäle, T. (2010), “Critical factors for knowledge management in project business”, Journal of Knowledge Management, Vol. 14 No. 1, pp. 156-168.

Akhavan, P. and Pezeshkan, A. (2014), “Knowledge management critical failure factors: a multi-case study”, VINE: The Journal of Information and Knowledge Management Systems, Vol. 44 No. 1, pp. 22-41.

Akhavan, P., Reza Zahedi, M., Hosein. and Hosein, S. (2014), “A conceptual framework to address barriers to knowledge management in project-based organizations”, Education, Business and Society: contemporary Middle Eastern Issues, Vol. 7 Nos 2/3, pp. 98-119.

Akram, K., Mehmood, N. and Khan, I. (2015), “A conceptual linkage between knowledge management, competitive advantage and competitive maneuvering of organization”, International Journal of Scientific and Research Publications, Vol. 5 No. 2, pp. 2250-3153.

Alavi, M. and Leidner, D.E. (2001), “Review: knowledge management KM and knowledge management KM systems: conceptual foundations and research issues”, MIS Quarterly, Vol. 25 No. 1, pp. 107-136.

Ale, M.A., Toledo, C.M., Chiotti, O. and Galli, M.R. (2014), “A conceptual model and technological support for organizational knowledge management”, Science of Computer Programming, Vol. 95, pp. 73-92.

Al-Shammari, M. (2008), “Toward a knowledge management KM strategic framework in the Arab region”, International Journal of Knowledge Management KM (IJKM), Vol. 4 No. 3, pp. 44-63.

Altameem, A.A., Aldrees, A.I. and Alsaeed, N.A. (2014), “Strategic information systems planning (SISP)”, Proceedings of the World Congress on Engineering and Computer Science, October, Vol. 1.

Amrollahi, A., Ghapanchi, A.H. and Najaftorkaman, M. (2014), “A generic framework for developing strategic information system plans: insights from past three decades”, PACIS, 2014 December, p. 332.

APQC (2015), “How companies spend on knowledge management”, available at: www.apqc.org/ knowledge-base/documents/how-companies-spend-knowledge-management (accessed 12 October 2017).

APQC (2018), “Strategic planning for knowledge management”, available at: www.apqc.org/knowledge- base/documents/strategic-planning-knowledge-management-community-call (accessed 10 January 2018).

Beiryaei, H.S. and Jamporazmay, M. (2010), August). “Propose a framework for knowledge management KM strategic planning (KMSSP)”, International Conference On Electronics and Information Engineering (ICEIE), IEEE, Vol. 2, pp. V2-469.

Bolisani, E. and Bratianu, C. (2017), “Knowledge strategy planning: an integrated approach to manage uncertainty, turbulence and dynamics”, Journal of Knowledge Management, Vol. 21 No. 2, pp. 233-253.

Bolisani, E. and Scarso, E. (2015), “Strategic planning approaches to knowledge management: a taxonomy”, VINE, Vol. 45 No. 4, pp. 495-508.

Chen, Y.Y. and Huang, H.L. (2010), The Knowledge Management KM Strategic Alignment Model (KMSAM) and Its Impact on Performance: An Empirical Examination, INTECH, London.

Chen, Y.Y. and Huang, H.L. (2012), “Knowledge management fit and its implications for business performance: a profile deviation analysis”, Knowledge-Based Systems, Vol. 27, pp. 262-270.

Chen, Y.Y., Yeh, S.P. and Huang, H.L. (2012), “Does knowledge management KM ‘fit’ matter to business performance?”, Journal of Knowledge Management, Vol. 16 No. 5, pp. 671-687.

Choi, B., Poon, S.K. and Davis, J.G. (2008), “Effects of knowledge management strategy on organizational performance: a complementarity theory-based approach”, Omega, Vol. 36 No. 2, pp. 235-251.

David, F.R. and David, F.R. (2015), Strategic Management: concepts and Cases, 15th ed., Prentice Hall, Peaeson.

Dickel, D.G. and de Moura, G.L. (2016), “Organizational performance evaluation in intangible criteria: a model based on knowledge management KM and innovation management”, RAI Revista De Administração e Inovação, Vol. 13 No. 3, pp. 211-220.

Donate, M.J. and Canales, J.I. (2012), “A new approach to the concept of knowledge strategy”, Journal of Knowledge Management, Vol. 16 No. 1, pp. 22-44.

Donate, M.J. and de Pablo, J.D.S. (2015), “The role of knowledge-oriented leadership in knowledge management KM practices and innovation”, Journal of Business Research, Vol. 68 No. 2, pp. 360-370.

Ekionea, J.P.B. and Swain, D.E. (2008), “Developing and aligning a knowledge management KM strategy: towards a taxonomy and a framework”, International Journal of Knowledge Management KM (IJKM), Vol. 4 No. 1, pp. 29-45.

Farzaneh, N. and Shamizanjani, M. (2014), “Storytelling for project knowledge management across the project life cycle”, Knowledge Management & E-Learning, Vol. 6 No. 1, p. 83.

Greiner, M.E., Böhmann, T. and Krcmar, H. (2007), “A strategy for knowledge management”, Journal of Knowledge Management, Vol. 11 No. 6, pp. 3-15.

Hashim, S.N., Abdullah, R. and Ibrahim, H. (2015), August). “Collaborative knowledge management KM system strategic planning (CKMS 2 P): a systematic literature review”, 4th International Conference on Software Engineering and Computer Systems (ICSECS), IEEE, pp. 55-60.

Hoque, M.R., Hossin, M.E. and Khan, W. (2016), “Strategic information systems planning (SISP) practices in health care sectors of Bangladesh”, European Scientific Journal, Vol. 12 No. 6.

Kamara, J.M., Anumba, C.J. and Carrillo, P.M. (2002), “A CLEVER approach to selecting a knowledge management KM strategy”, International Journal of Project Management, Vol. 20 No. 3, pp. 205-211.

Kargaran, S., Jami Pour, M. and Moeini, H. (2017), “Successful customer knowledge management implementation through social media capabilities”, VINE Journal of Information and Knowledge Management Systems, Vol. 47 No. 3, pp. 353-371. 

Kim, T.H., Lee, J.N., Chun, J.U. and Benbasat, I. (2014), “Understanding the effect of knowledge management strategies on knowledge management performance: a contingency perspective”, Information and Management, Vol. 51 No. 4, pp. 398-416.

Kim, Y.G., Yu, S.H. and Lee, J.H. (2003), “Knowledge strategy planning: methodology and case”, Expert Systems with Applications, Vol. 24 No. 3, pp. 295-307.

Liebowitz, J. (2016), Successes and Failures of Knowledge Management, Morgan Kaufmann, Burlington, MA.

Lin, C., Wu, J.C. and Yen, D.C. (2012), “Exploring barriers to knowledge flow at different knowledge management maturity stages”, Information & Management, Vol. 49 No. 1, pp. 10-23.

Lopez-Nicolás, C. and Meroño-Cerdán, Á.L. (2011), “Strategic knowledge management, innovation and performance”, International Journal of Information Management, Vol. 31 No. 6, pp. 502-509.

Lu, W. (2017), “Knowledge management in organizations”, Proceedings of 12th International Conference, KMO 2017, Beijing, 21-24 August, Springer.

Martinsons, M.G., Davison, R.M. and Huang, Q. (2017), “Strategic knowledge management failures in small professional service firms in China”, International Journal of Information Management, Vol. 37 No. 4, pp. 327-338.

Mládková, L. (2014), “Knowledge strategy: key player or relict of the past?”, Procedia-Social and Behavioral Sciences, Vol. 150, pp. 628-636.

Nazim, M. and Mukherje, B. (2011), “Implementing knowledge management KM in indian academic libraries”, Journal of Knowledge Management KM Practice, Vol. 12 No. 3.

Oluikpe, P. (2012), “Developing a corporate knowledge management KM strategy”, Journal of Knowledge Management, Vol. 16 No. 6, pp. 862-878.

Parlby, D. and Taylor, R. (2000), “The power of knowledge: a business guide to knowledge management”, Online, cited.

Perçin, S. (2010), “Use of analytic network process in selecting knowledge management strategies”, Management Research Review, Vol. 33 No. 5, pp. 452-471.

Rhem, A. (2015), “Why do knowledge management (KM) programs and projects fail?”, KM Institute, 22 September, available at: www.Kminstitute.Org/blog/why-do-knowledgemanagement-km- programs-and-project-fail

Ribiere, V. and Walter, C. (2013), “10 years of KM theory and practices”, Knowledge Management KM Research & Practice, Vol. 11 No. 1, pp. 4-9.

Rouhani, S. and Savoji, S.R. (2016), “A success assessment model for BI tools implementation: an empirical study of banking industry”, International Journal of Business Intelligence Research (IJBIR), Vol. 7 No. 1, pp. 25-44.

Shankar, R., Singh, M.D., Gupta, A. and Narain, R. (2003), “Strategic planning for knowledge management KM implementation in engineering firms”, Work Study, Vol. 52 No. 4, pp. 190-200.

Sherif, K. (2006), “An adaptive strategy for managing knowledge in organizations”, Journal of Knowledge Management, Vol. 10 No. 4, pp. 72-80.

Shujahat, M., Hussain, S., Javed, S., Malik, M.I., Thurasamy, R. and Ali, J. (2017), “Strategic management model with lens of knowledge management and competitive intelligence: a review approach”, VINE Journal of Information and Knowledge Management Systems, Vol. 47 No. 1, pp. 55-93.

Wang, J., Ding, D., Liu, O. and Li, M. (2016), “A synthetic method for knowledge management KM performance evaluation based on triangular fuzzy number and group support systems”, Applied Soft Computing, Vol. 39, pp. 11-20.

Wheelen, T.L. (2011), Strategic Management and Business Policy: Toward Global Sustainability, 13 ed., Prentice Hall, Upper Saddle River, NJ.

Wiig, K. (1998), “The role of knowledge-based system in knowledge management”, Workshop on knowledge management KM and at US Dept. of Labor, Washington, DC.

 Yosua, A. and Tjakraatmadja, J.H. (2015), “Assessment and planning of knowledge management KM at PT dirgantara Indonesia (persero)”, Procedia-Social and Behavioral Sciences, Vol. 169, pp. 109-124.

Zack, M. (2002), “Developing a knowledge strategy”, The Strategic Management of Intellectual Capital and Organizational Knowledge, Oxford university press, Oxford.

Zhao, J., de Pablos, P.O. and Qi, Z. (2012), “Enterprise knowledge management KM model based on China’s practice and case study”, Computers in Human Behavior, Vol. 28 No. 2, pp. 324-330.

Further reading

Becerra-Fernandez, I. and Sabherwal, R. (2014), Knowledge Management: Systems and Processes, Routledge.

Peppard, J. and Ward, J. (2004), “Beyond strategic information systems: towards an IS capability”, The Journal of Strategic Information Systems, Vol. 13 No. 2, pp. 167-194.

Notes on Implementing and Managing eGovernment: An International Text

I’ve been reading Richard Heek’s book Implementing and Managing eGovernment: An International Text as part of my doctoral thesis research and the book is, in a few words, foundational, seminal, required reading for anyone in the field of Innovation and Technology Management with a focus on eGovernment. I highly reccommend it.

Below are two organizational spreadsheets, followed by notes from the book.

Data Stakeholder Governance Considerations

Sample Item Costs for eGovernment Planning

Notes

There may be a focus on problem solving and innovation, and a focus on team-working and flexibility (Hafeez and Savani, 2003). The agencies may be characterized by what is known as a ‘task culture’. 

This hybrid management model argues first for an analysis of current public sector realities; and second for an assessment of which management and e-government system designs will best fit this reality. 

The sectors differ in many ways, including:

their espoused objectives (broader in the public sector); 

their view of ‘customers’ (more holistic in the public sector); 

their relation to ‘customers’ (mixed with roles as citizens and compliers in the public sector)

their accountabilities and perceived stakeholders (broader in the public sector)

their human and technological infra- structure (weaker in the public sector); 

the politicization of their processes (greater in the public sector); 

the scale and nature of competition (smaller and political in the public sector) 

Where decentralized information systems, manual or computerized, are already in place, barriers to centralization may be severe. In order to centralize, changes may need to be made to the organization’s whole information systems architecture: new data fields and formats, new hardware and software, new processes by which to handle data, and new processes by which to make decisions and take actions. 

Differences between the objectives and values (that is, the cultures) of particular groups in the public sector also cause a problem. 

Centralized approaches require the commitment of four key resources – money, time, people, and skills – all in short supply in the public sector. For many public organizations, a centralized approach may not be possible because of financial constraints; because staff are too busy on other things; or because no-one has the confidence or capabilities to undertake the necessary planning and coordination tasks. 

decentralized units develop different ways of working, different mindsets that create quite different views of the world between groups; different jargon used in communication; and different issues and people that are valued. 

aspects of system use such as implementation, operation, troubleshooting and maintenance are also likely to occur more quickly under a decentralized regime. 

Training, maintenance and administration costs also contribute. Large, centralized computing systems are estimated to cost something like one-third to one-half of this amount per user per year (CBR, 2001). 

A decentralized approach may be most economic for public organizations, because it saves on overt input costs. A centralized approach may be most efficient, because it avoids waste and duplication. But a successful hybrid approach may be most effective because it can simultaneously provide: 

  • the control necessary to share key resources (including data), to avoid duplication, and to achieve economies of scale; and
  • the freedom necessary to meet user needs, and to overcome blocks to IT usage and system development. 

US State Department, for example, successful progress on e-government has come from retaining computing and data management architecture under control of a central IT office, while decentralizing systems develop- ment responsibilities 

Division is compatible with – indeed, is defined as – simultaneous centralization and decentralization. It can be seen in the possible division of responsibilities described for systems development. It can also be seen in the division of responsibilities between client and server computers. 

That which we can call a managerial or information systems centralization, reflects Nolan’s (1979) well-known ‘stages of growth’. It shows the gradual increase in managerial attempts to control the information systems (which would include e-government systems) within an organization. Nolan’s model has been criticized for a lack of predictive power and a generality that fails to match individual organizational experience. However, its core sense of increasing managerial engagement with IT does appear sound. 

A decentralized approach will also help to spread IT awareness and skills, and even some understanding of the informational aspect of e-government, in a way that other approaches might not. For some public agencies, it is the lack of just such awareness, skills and under- standing that represents a key barrier to effective use of IT in government. 

there are tensions between the somewhat theoretical notions of organizational rationality, and the more real forces of politics in government. Hence, rational logic may play only a minor role in determining which approach is used. 

For example, the approach adopted will be shaped by the organization’s technology (e.g. whether the computing architecture is already centralized or decentralized); staffing and skills (e.g. what skills are avail- able); management systems and structures (e.g. whether the main organization has a centralized or decentralized structure) and other resources (e.g. the availability of finance). 

Stakeholder values will also play a role, such as their perceptions, their awareness of the costs and benefits of particular approaches, and their historical experi- ences. For instance, the recent experiences of staff with e-government systems create either a satisfaction that is inertial, or a dis- satisfaction that demands change. 

buuuut it is organizational politics and its roots in the self-interest of particular stakeholders that will help determine what management approach to e-government is selected 

Four familiar political constituencies (see Figure 2.2) can be identified, whose conflict or compromise within organizations helps to determine which approach is chosen: senior managers, politicians, IT staff, and mainstream staff. 

Broader political, pressures from the outside world – ranging from national political initiatives to dominant ideologies/philosophies – also play their part. Staff in public sector organizations are subject to continuous external pressures, that include (Barrett and Greene, 2001; Abramson and Morin, 2003): 

  • Pressure to conform to the requirements of external bodies, such as central government bodies and funding agencies. An e-government unit run by central government may, for example, be pushing a department to adopt certain centralized ‘best practices’: see, for example, Box 2.6. 
  • Pressure through (mis)perception of what other organizations are doing, which may be transmitted through informal contacts, management texts and training programs, or dealings with consultancy organizations. 
  • Pressure from private sector IT vendors to purchase particular technologies and systems. 

Chapter 3

eGovernment Strategy 

Centralized e-government strategic planning is a six-step process that, overall, asks: ‘Where
are we now?’, ‘Where do we want to get to?’, and ‘How do we get there from here?’

a successful strategy can develop senior management understanding that e-government systems are information systems not just IT, and build consensus and commitment to a strategic vision for e-government. It permits a fundamental review of the organization’s use of informa- tion and technology, leading to a comprehensive understanding of information systems requirements. 

It also provides a detailed plan of action on e-government for the organization. 

Problems of Federal eGovernment Expenditure in the US 

The 2003 US federal budget identified ‘six chronic problems that limit results from Federal IT spending: 

  • Agencies have automated existing outdated processes, instead of fixing underlying management problems or simplifying agency procedures to take advantage of new e-business and e-government capabilities. 
  • Agencies have made unnecessarily duplicative IT investments. 
  • Inadequate program management – many major IT projects have not met cost,
    schedule and performance goals. 
  • Few agencies have had plans demonstrating the linkage between IT capabilities
    and the business needs of the agency. 
  • Agencies have built individual capabilities that are not interoperable with one
    another. Few IT investments significantly improve mission performance. 
  • Poor IT security – major gaps have existed in agency and Government-wide inforsmation and IT-related security.’ 

e 2003 Federal Enterprise Architecture: A ‘business-based framework for Government-wide improvement … constructed through a collection of interrelated ‘reference models’ designed to facilitate cross-agency analysis and the identification of duplicative investments, gaps, and opportunities for collaboration within and across federal agencies.’ (FEAPMO, 2003)

The Strategic Context for Federal Public Agency eGovernment Strategy in the US 

The 2002 eGovernment Act

The 2002 Federal Information Security Management Act

The 2001 President’s Management Agenda

The 1998 Government Paperwork Elimination Act

The 1996 Clinger-Cohen Act

The 1996 Electronic Freedom of Information Act amendment:

The 1993 Government Performance Results Act:

Where are we now?

An answer would include details of the organization’s current structure and functions; key client groups; existing problems that need to be addressed; and important current and forth- coming factors – particularly policies and political priorities 

Where do we want to get to? 

An answer would include details of the organization’s objectives, and some vision of the future organization that will enable it to overcome current and forthcoming problems, and to achieve its objectives. Finally, it asks, ‘How do we get there?’ This would be achieved through a statement of management strategy about major changes to organizational structure and functions in order to reach its future vision. 

two types of organizational function are derived from the organization’s wider business strategy and prioritized for further investigation: 

  1. Existing organizational functions that are to be retained in order to meet organizational objectives 
  2. New organizational functions that need to be introduced in order to meet organizational objectives.

This is the essence of ‘portfolio’ or ‘program’ management: using criteria to align projects with agency strategy. 

Impact priorities, for example, might be: 

highest savings/financial return on investment

highest public visibility/political return on investment

highest learning/demonstrator effect

strongest focus on existing organizational deficiencies

strongest support to key external client  services (as opposed to internal administrative activities). 

Implementation priorities, for example, might be: 

lowest risk/highest feasibility

lowest cost to implement

fastest time for completion

eGovernment Systems Architecture needs three main components:

  1. A data model showing the structure of unified, organization-wide data to which the e-government systems will have access; often illustrated using an entity-relationship diagram (this and the other diagrams mentioned here are described in greater detail in Chapter 8).
  2. A process model showing the key activities of the organization that the e-government systems will either support or under- take; often illustrated using a process diagram.
  3. A data/process model showing the organization-wide connection between business processes and data entities, and the organization-wide movement of data that e-government systems will enable; often illustrated using a data flow diagram. 

Information engineering

This looks across the whole organization and focuses on two components:
business processes: the individual activities of the organization that help meet public sector objectives. 

data classes: data entities of relevance to the organization that are made up from individual data elements (or attributes). 

Data and process are principally connected, and therefore principally investigated, through the mechanism of decision making and action. 

From this investigation, the entire organization is analyzed into two long lists of business processes and data entities. These are cross-checked through a process/data matrix that shows which processes create or use which data. The data entities and processes can then be grouped together into clusters of data and processes that represent required e-government systems within the organization.

Critical success factors
it starts by asking managers to specify the factors they consider to be critical for the successful performance of particular organizational functions

It is the intention that e-government strategy be shaped by organizational objectives and process/information requirements rather than by technology: 

Determining eGovernment organizational architecture:

As part of the ITSPMO analysis, general strategic decisions may include:

  1. making sure that it is the government rather than the company that steers e-government 
  2. stating the approach to management of organizational change, including a determination of the needs for cultural change
  3. clearly allocating responsibilities for e-government systems development and management
  4. identifying major competency gaps and approaches to closing them through human resource strategies
  5. deciding how back-office procedures may be restructured to support e-government
  6. locating the e-government/IT function within the wider organizational structure
  7. demarcating which services (e.g. systems development, training and systems operation) are to be sourced in-house and outsourced
  8. identifying procedures to be used when tendering for and selecting e-government systems products and services
  9. specifying standard systems development methodologies and tools to be used 
  10. identifying financial approaches to be adopted, such as public–private partnerships.

Strategy Implementation 

Disseminate and Plan eGovernment Actions 

A typical business case for an e-government project might include a statement of project objectives; an estimation of benefits, risks and constraints; and an estimation of resource requirements covering finance, human resources (i.e. jobs and skills), technology, and timescales. Details of project deliverables (i.e. things the e-government projects should produce such as feasibility reports, specification documents, and both interim and final versions of the system) and timetables can be approved at this stage. So, too, can mechanisms for reporting back to the eGovernment Steering Group on progress. 

for personnel training and development, for finance, for technology, etc. There may also be an additional dimension to the matrix – time – showing what is to occur and be paid for within particular financial years. 

Many public organizations also find themselves in situations of constant and largely uncontrollable flux from factors such as changeover in ruling political parties; constant circulation of senior politicians and officials; emergence of new political initiatives and legislation that alter organizational activities, priorities and even structures; sudden imposition of cost- cutting measures; sudden external crises that demand a reaction; changes within the client groups the organizations serve; and changes in IT, IT standards and IT suppliers. 

The Outcome of eGovernment Strategy 

There are many ways for strategies to go wrong:

  • Lack of Strategy
  • Underused Strategy – The strategies give the impression of box-ticking – doing just enough to meet the demands of external policies and oversight agencies; and often doing that in a hurry – without true internal ownership of, or commitment to, the strategy. 
  • When strategy has been hijacked
  • When strategy is ‘strategic concrete’

Focus on process, not content

The process of trying to create a strategy may be more valuable than the formal deliverables. Value is sought from the informal process deliverables such as: making sense of the past, learning from experience, encouraging dialogue and communication, and making choices 

A hybrid approach to e-government planning will mean a balance between central and local. So, for instance, it could mean that e-government planning is seen as incremental, as participative, as limited in scope: guiding more than dictating. This approach is sometimes referred to as ‘pick- ing a course and steering it’: being adaptable to new constraints and new circumstances as they arise rather than imagining that the strategy is cast in ‘tablets of stone’. 

Sub-Strategic eGovernment Planning 

Given the many constraints to strategic plan- ning, it may be more feasible to plan at what might be termed the ‘sub-strategic’ level. This pares back what planning hopes to achieve until the intention matches what can be achieved in the organization. 

Tactical-Plus eGovernment Planning 

pushing the objectives of an individual e-government system ‘upstream’ to think how it contributes to the overall work of the organization; 

assessing the opportunity costs of going ahead with this particular e-government system rather than others; and/or 

assessing whether there should be com- patibilities between this and other exist- ing or planned systems. 

Chapter 4 Managing Public Data 

CARTA 

Completeness 

Accuracy
Relevance
Timeliness
Appropriate presentation

Prosumption – Where the consumers of public services themselves become producers of their own data often via web-based electronic forms.

What are the Positions to Consider when Managing?

Situation A: Departmental Location 

Situation B: Low-Level Independence 

Situation C: High-Level Independence 

Situation D: Outsourcing 

Outsourcing 

An equal, if not greater drive to outsourcing is to address human resource constraints by accessing staff, skills and ideas that are not available in-house. Other perceived benefits of outsourcing include the provision of a higher quality of service; greater certainty about costs; greater flexibility, especially of labor since it is easier to hire and fire external staff; access to advanced technology; and greater ability to focus management on the core deliverables of the public sector 

Cons

a clash of work cultures and understanding between the public sector client and the private sector sub-contractor; 

a loss of control over the service being provided, with the sub-contractor starting to dictate to a dependent client; 

a loss of core e-government competencies to the sub-contractor, such as controls over security. 

However, in practice, decision making about outsourcing in the public sector has only partly been driven by organizational rationality. It has also been driven by behavioral/political factors (Peled, 2000a). Managers are found to outsource e-government work because they: 

  • have been naive in their assumptions about the benefits that will ensue
  • believe association with such an initiative will be good for their careers 
  • wish to ‘clip the wings’ of the in-house IT unit
  • stand to gain financially thanks to the covert generosity of the sub-contractor

5.2 People

Competencies can be understood in relation to three domains:

Skills, Knowledge, Attitude 

Attitude is changes by appeals to the the rational mind, the political mind, and the heart. 

Greater use of case studies of e-government failure and/or best practice will likely be a move in the right direction (Parrado, 2002). Cases can persuade stake- holders, for instance, of the dangers of ignoring basic systems development prac- tice, or of the importance of understanding the organizational and human context of e-government systems. 

A good hybrid manager will recognize that psychological factors play a role: autonomy, challenge, recognition and the opportunity for career advancement. Direct work content factors are also important, such as training opportunities, flexibility of work schedule and clarity of task specification. 

On a shorter-term basis, responsibility for a personal development plan can be shifted to the employees, and used as part of the annual performance review. 

Plans must be far more than just a critical path; they must include deliverables, resource requirements, and reporting arrangements. Over time, the number of elements that must be planned has grown, typically in response to perceived problems with past projects. What was once just a ‘project plan’ has now been broken down; for example into: a scope management plan, a resource plan, a risk management plan, a procurement plan, a quality plan, a communication plan, a security plan, a change management plan, and a cost management plan.

Which standards should be followed? ISO 9001:2000 

Peer review – a hybrid rather than rational project technique – seems to have a better record, and has now been adopted by a number of governments as a best practice. 

Behavioral Approaches to Project Management 

the rational model fails to fully explain or predict what happens in the public sector. It also fails to fully guide real-world best practice, leading e-government practitioners to criticize PMMs for their inflexibility. Indeed, some who study the realities of projects see the rational approach as potentially guiding worst practice: 

“IT projects die by their own hand. The more they are bound by lists, rules, checks, restrictions, regulations, and so on, the more they drive out the human spirit of creativity, of innovation, of dealing with ambiguity, and of fun. People brought up in technical environments may not see the horror of this kind of approach.”

To plug this gap, and ensure that a more behavioral approach and more behavioral expertise are introduced, some governments are mandating the involvement of senior non-IT officials. The Canadian government, for example, defines a formal requirement on e-government projects for two things (OECD, 2001). First, a project sponsor who is responsible for the business function, and who has solely behavioral-side competencies ( judgment, leadership, communication, organizational awareness). Second, a project leader who is a senior departmental official with, again, largely behavioral-side competencies and only cursory IT management skills at best. Similarly, the UK government’s analysis of e-government project failures concluded with the requirement for projects to have a ‘senior responsible officer’ (CITU, 2000). The officer would be drawn from the business not the IT side of the organization. 

Primary Project Stakeholders

decision makers: those who make major project-related decisions, such as whether or not to proceed with the project

gatekeepers: those who control access to higher authorities

influencers: those who advise decision makers or whom decision makers take note of

end users: those who will directly use the output from the e-government system and/or from the business function it supports

champions: those who will support and muster resources for the project

Smart behavioral players work to break through the rationality barrier to get to the real objectives and values underneath. 

  • by understanding that professional relationships have different bases and require different techniques from those adopted with social relationships
  • by establishing rapport with the other person: looking for common ground 
  • developing on their areas of interest; even mirroring their speech and body language in order to ‘tune in’
  • by active listening that involves really concentrating and asking questions to get to the root of issues, beliefs, problems, needs, and so on 
  • by tailoring communication to the needs of the recipient 

Tailoring your Message 

The sociable ones: The idealistic ones:
  • Be clear and explicit, don’t just imply. 
  • Show me how people will benefit. 
  • Demonstrate immediate and
    practical results. 
  • Show me respect.
  • Engage with my personal values. 
  • Paint pictures and draw analogies
    that have meaning. 
  • Be passionate and engage my
    imagination. 
  • Show how it will contribute to
    the greater good of human kind.
The theoretical ones: The down to earth ones:
  • Show how it fits into the bigger picture. 
  • Ensure the theoretical base is sound. 
  • Appeal to my intellect and imagination. 
  • Be a credible source of information.
  • Be organized and structured. 
  • Be practical and realistic. 
  • Work logically and systematically
    through your analysis. 
  • Offer proof and evidence.

1. Preparation: Getting as much information as possible not just in relation to the topic under discussion but also in relation to the objectives and values of other parties; being clear about one’s own ‘bottom line’. 

2. Initial exchange: Drawing out other individuals and probing with questions to develop a better sense of their objectives and values; weighing up relative bargain- ing powers. 

3. Negotiation: being assertive; using and observing body language; identifying issues that can easily be agreed and issues that are low-cost to one side but high benefit to the other; being creative about what can be traded; exploring 

possible compromises. 

4. Agreement: summarizing the discussion; avoiding/dealing with last minute conditions. 

5. Implementation: setting out a clear schedule of tasks and responsibilities.

The acquisition of negotiating skills and the ability to apply the techniques just described is becoming increasingly integral to e-government project management 

Components of Massachusetts model: 

  • business problem and scope of work: the problem being addressed; the rationale for the e-government project; and the major tasks to be undertaken; 
  • workplan and time schedule: a Gantt chart ‘not intended to be a project log of each and every small detail, but rather a comprehensive plan of tasks, team resources and timelines’
  • management approach and personnel: for both the steering committee and project implementation team; 
  • acceptance criteria and deliverables: the key outputs from the project and criteria that will be used to judge whether or not that output is acceptable
  • task order budget
  • signatures: of all the key ‘business partners’.

Such structures as the above will allow 

  1. early identification of failures 
  2. mechanisms to disperse learning about both success and failure. 

Why should there be so much politicking around e-government? In short, because two pre-conditions of politicking are met. 

First, there are interdependent groups that have different objectives and values. This is clearly the case in public sector organizations. The ‘interdependent but different’ perspective applies to the formal functional divisions within public agencies. 

Second, there are important but scarce resources involved. 

e-Government brings together in large amounts both critical tangible resources – people, money and equipment – and critical intangible resources – information, power and kudos. They therefore form a key locus for organizational politics. 

Techniques of Influence 

Reason: ‘Relies on the presentation of data and information as the basis for a logical argument that supports a request.’ Reason is typically a first choice for influencing a boss or subordinate, and it often relates to a base of expert or information power. 

Friendliness: ‘Depends on the influencee thinking well of the influencer.’ It is often used with co-workers, but may also be used with subordinates and supe- riors. It often relates to a base of personal power. 

Coalition: ‘Mobilizing other people in the organization to support you, and thereby strengthening your request.’ It depends 

Bargaining: Negotiation and exchanging benefits based upon the social norms of obligation and reciprocate. The resources that are traded are very varied but can include assistance, support and information. It often relates to a base of reward power. Assertiveness: Uses continuous reminders via an insistent and forceful manner. It is often used with subordinates and relates to a base of legitimate power. 

Higher authority: ‘Uses the chain of command and outside sources of power to influence the target person.’ This can be the threat or promise of involving the influencee’s boss, or invoking that boss’ own priorities. It can also involve an appeal to higher ethical or cultural values within the organization. It may involve recourse to outside ‘experts’, such as consultants, or to the media. A variation, much found in e-government, is to blame the technology or the data, though this may fall under the heading of manipulation. Its strength relies particularly on affiliation power. 

Sanctions: Influence through the promise of reward or threat of punishments. In its negative form, this may encompass all formal disciplinary procedures up to dis- missal. It may encompass informal actions: blame, bad-mouthing, bullying. It may also encompass the removal of rewards (e.g. transfer, demotion). Sanctions often relate to a base of legitimate or coercive power. 

Manipulation: Influence by controlling the framing of discussions, or the claimed rules for discussion, or the information that is allowing into a negotiation. Part of this process will be the manipulation of the public discussions and public relations that set much of the agenda for government. This type of approach may also include undermining others involved. 

Withdrawal: Influence through disengagement or non-compliance. 

Time and again, middle managers in public sector organizations have good ideas for new or redesigned e-government systems. Yet they cannot get those ideas implemented. They blame their bosses, or the IT staff, or politicians, and so on. In many cases, though, they should blame themselves for failing to recognize their own need for better communication, negotiation and, above all, influencing skills. 

Chapter 6

Emerging Management Issues for eGovernment 

Great care must be taken that measures are valid (i.e. that they do measure what they seek to measure), relevant (i.e. that they measure something on which the employee’s actions have an effect) and valuable (i.e. that they measure what is organizationally important about the job). IT staff behavior will be skewed by performance measurement towards the measured components of the job and away from the non-measured. Only careful selection of indicators will ensure that this skewing is beneficial for the organization. 

Performance management in the public sector 

  • offer career development opportunities, or psychic pay: quasi-financial incentives such as paid time off or new equipment. In some surveys, public servants rate these above money as preferred rewards. 
  • Use group incentives since individual rewards can demotivate other team members, whereas group rewards tend to encourage collaboration.  
  • do not punish occasional mistakes, only chronic poor performance. Use progressive discipline but also use training and peer pressure. 

Three main focal points for performance indicators can be applied to the IS/IT function: 

Input- IT Measures

Output- Information Services

Outcome- Business Process

Measurement of Performance 

In most cases the measurement procedure will be clear within the indicator definition. Three main assessment indicators:

  • Internal subjective: The measures are based on the judgment of internal clients, such as customer satisfaction rating scales. 
  • Internal objective: The measures are based on objective quantification within the organization, such as the jobseeker placement measure. 
  • External: The measures are based on quantification from outside the organization. 
  • Price testing: Comparing the internal costs of a service with the estimated cost/price of external providers and benchmarking (which includes a broader set of performance measures) 

Control of Performance 

Provider management control: Managers within the IS/IT service provider are responsible for managerial rewards and remedial measures. 

Client management control: Managers within the IS/IT service client are responsible for managerial rewards and remedial measures. 

Client financial control: Managers within the IS/IT service client are responsible for financial rewards and remedial measures. 

Arbitrary basis: The sum paid does not relate to service use but to some relatively arbitrary measure such as the size of the user department. The lack of linkage creates limited financial control on performance; arguably less than that available via a managed service level agreement. 

Cost basis

Market basis 

The central thrust is that agencies must be good at writing documents and at managing projects. It would thus be possible to score a ‘green’ without producing anything that had actually made life better for citizens and other agency clients. 

The more the government charges for its data, the greater the barriers to access become. Yet the wider it allows access, the less it can earn from data sales. 

Access Policies for Freedom of Information

The enactment of FOI legislation has required the development of in-house policies by public agencies within its purview. Typical issues to be dealt with include (DOI, 2002): 

Terminology: Explicitly defining what is meant by terms such as records and requests; and classification of different types of data held by the agency.

Procedures: Clarifying how citizens/ businesses can obtain data direct without requests; how information requests are to be made; and the means by which those requests will be responded to.

Data management: Ensuring that the type of back-office, records and data manage- ment procedures described elsewhere in this chapter are followed so that data and records can be located in a timely and cost-efficient manner.

Performance measures: Setting out performance indicators (typically time taken) for the FOI response service.

Charges: Determining a reasonable level of charges to be levied for searches and copying; determining policy on any fee waivers; putting a billing and payment system in place.

Handling variations: Determining procedures in the case of various types of data/records such as those not held by the agency; those held by other public agencies; those deemed sensitive or covered by privacy legislation; those held by other non-public agencies.

Appeals: Setting in place an appeals procedure to appeal against problems with performance, charges or denial of access.

Responsibilities: Designating specific officers as responsible for FOI implementation, and for appeals. 

Update: Putting in place a mechanism for review and update of FOI procedures (e.g. in response to new technology, case law, organizational changes, new orders, or FOI response performance and feedback). 

Digital Divide

Because of those costs, there is an uneven profile of those who own and use IT: the rich not the poor; the graduate not the school leaver; the ethnic majority not the ethnic minority; the urban not the rural citizen; the young not the old; men not women. 

Pouring resources into e-government can therefore benefit the haves rather than have nots, and increase polarization within society. There are already some signs of this, with evidence that local government electronic service delivery is of poorer quality in areas with lower levels of Internet access 

Governments may set up initiatives focused on increasing access to IT that is government-or-community-owned IT. Such IT may be placed in a variety of locations: 

  • public spaces, such as common areas within shopping malls; 
  • semi-public spaces, such as libraries or sport facilities; 
  • dedicated spaces, such as community telecentres housing a room-full of Internet- linked PCs. 

The watch- word for government must therefore be ‘supplement’ not ‘supplant’. Provision of public sector data and other services electronically should be seen as an additional weapon in the armory that sits alongside traditional face-to-face and phone-based methods. It should not be seen as a way of replacing those more traditional methods. 

Reviewing Sensitive Public Information

The following questions will assist security professionals in reviewing sensitive infor- mation that has been, or could be, made publicly accessible. 

Has the information been cleared and authorized for public release?

What impact could the information have if it was inadvertently transferred to an
unintended audience?

Does the information provide details concerning enterprise security?

Does the information contain personnel information such as biographical data,
addresses, etc.?

How could someone intent on causing harm misuse the information?

What instructions should be given to legitimate custodians of sensitive information
with regard to disseminating the information to other parties such as contractors?

Could this information be dangerous if it were used in conjunction with other
publicly available information?

Could someone use the information to target personnel, facilities or operations? 

Could the same or similar information be found elsewhere?

Does the information increase the attractiveness of a target? (OCIPEP, 2002)

Policies on Disability

the law sets a clear threshold that must be achieved. However, in practice, e-government managers often seem to be ‘satisficing’ the issue: doing just enough to cover their backs but still leaving a gap between policy and practice.

Difficulties

public managers face a difficult balancing act between the requirements of central legislation and the localized needs of the public agency. These may conflict where, for example, the agency has to make the best of an outdated physical environ- ment, or where lack of money means what is ergonomically-best cannot be afforded. This balancing act can appear in the gap between policy on paper and policy in prac- tice. eGovernment managers may develop an internal policy document that fully meets all legislative requirements, but may then not fully implement the document. 

Chapter 7

Success in e-government comes from intelligent selection of individual techniques, from
‘hybrid thinking’, and from action on design–reality gaps rather than from slavish adherence to one particular methodology.

Background understanding of a proposed e-government project comes from asking five
questions: Who is involved? What is the problem? Why is the project happening? What
constraints exist? What will change in the near future?

eGovernment projects can be assessed in relation to their feasibility, priority, opportunity costs, and impact.

Four Core Stages:

1. analysis of what is currently happening, and of whether and why a new e-government system is needed
2. design of the new e-government system’s components
3. construction of the new e-government system

4. implementation of the new e-government system 

Successfully planned e-government systems will therefore be those that require a manageable degree of change. 

In order to assess this ‘degree of change’, the core of the systems development method described here will therefore consist of three activities: 

  1. mapping out the realities of the current situation
  2. designing a proposal for the new situation
  3. assessing the difference between the two, and reacting to that difference 

Systems Development Life Cycle

1. Project assessment: Identifying possible e-government projects; outlining basic project parameters; and assessing whether or not to proceed with the project. 

2. Analysis of current reality: Description and analysis of the seven ITPOSMO dimensions as they exist within the current situation of the organization. 

3. Design of the proposed new situation: Setting objectives for the proposed new e-government system, and then describing in general terms how the seven ITPOSMO dimensions should be different for the new system to meet these objectives. Different options for the new system may be evaluated at this point. 

4. System construction: Acquiring any new technology; undertaking detailed design of the new system; then building it, testing it and documenting it. 

5. Implementation and beyond: Training users to use the new system; converting data to new formats; introducing the new system; monitoring and evaluating its performance and context; then undertaking any necessary system maintenance. 

SSADM: Structured Systems Analysis and Design Methodology, 

No method is perfect but there are dangers for the public sector in adopting some of the harder methods. The public sector has had a tendency to choose such methods which then prove too old, inflexible, top-down, detailed, jargonized and time-consuming (Korac-Boisvert and Kouzmin, 1995). While these might have been appropriate to the routine clerical automations of the 1960s, they work poorly in politicized situations of change and uncertainty.