The copyright © of this thesis belongs to its rightful author and/or other copyright owner. Copies can be accessed and downloaded for non-commercial or learning purposes without any charge and permission. The thesis cannot be reproduced or quoted as a whole without the permission from its rightful owner. No alteration or changes in format is allowed without permission from its rightful owner.
TACIT KNOWLEDGE FOR BUSINESS INTELLIGENCE FRAMEWORK USING COGNITIVE-BASED APPROACH
HERISON SURBAKTI
DOCTOR OF PHILOSOPHY UNIVERSITI UTARA MALAYSIA
2022
Permission to Use
In presenting this thesis in fulfillment of the requirements for a postgraduate degree from Universiti Utara Malaysia, I agree that the Universiti Library may make it freely available for inspection. I further agree that permission for the copying of this thesis in any manner, in whole or in part, for the scholarly purpose may be granted by my supervisor(s) or, in their absence, by the Dean of Awang Had Salleh Graduate School of Arts and Sciences. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and Universiti Utara Malaysia for any scholarly use which may be made of any material from my thesis.
Requests for permission to copy or to make other use of materials in this thesis, in whole or in part, should be addressed to:
Dean of Awang Had Salleh Graduate School of Arts and Sciences UUMCollege of Arts and Sciences
Universiti Utara Malaysia 06010 UUM Sintok
ABSTRAK
Pengetahuan tersirat menjadi isu utama dalam pendekatan kecerdasan perniagaan terhadap sistem pengetahuan. Bagi menangkap pengetahuan tersirat bukanlah tugas yang mudah. Ini kerana, melibatkan data di dalam bentuk yang tidak terstruktur dan juga pelbagai sumber maklumat yang tidak mudah untuk diakses melalui cara tradisional. Penyelidikan ini menerangkan pendekatan sistematik untuk menangkap pengetahuan tersirat dengan membuat Kerangka Kecerdasan Perniagaan yang menunjukkan pengetahuan tersirat dapat diakses melalui berbagai kaedah dan kriteria pemilihan. Pendekatan ini adalah berdasarkan teori Fungsi Linguistik Sistematik, yang dibangunkan menjadi protokol temu ramah untuk pemilik pengetahuan. Data diubah menjadi peta kognitif untuk dibekalkan kepada Gudang Data. Kerangka ini diuji oleh 23 orang pustakawan dari perpustakaan di universiti Jawa Barat dan Yogyakarta, Indonesia. Algoritma dimulakan dengan temu ramah yang dikendalikan bagi mengenal pasti senarai masalah yang dihadapi oleh para pustakawan. Masalah-masalah tersebut kemudian diubah menjadi soalan soal selidik untuk mengenal pasti kualiti masalah seperti kekerapan, mendesak, keparahan, dan kepentingan. Seterusnya, dari hasil soal selidik, pemilik pengetahuan tersirat yang terbaik dikenal pasti. Mereka merupakan responden yang dapat menyelesaikan masalah yang tidak dapat diselesaikan oleh majoriti responden. Pemilik pengetahuan yang terbaik menjalani temu ramah mengikut tatabahasa untuk mengumpulkan penyelesaian yang mereka menggunakan untuk masalah tersebut. Transkripsi hasil temu ramah diubah menjadi peta kognitif yang memvisualisasikan penyelesaiannya.
Peta kognitif ini disimpan di Gudang Data untuk siap dikumpulkan pada bila-bila masa untuk tujuan analisis. Kerangka ini disahkan melalui perisian Power BI dan diulas oleh tujuh pakar domain. Hasil pengesahan ini menunjukan Power BI boleh memaparkan kepentingan fenomena dan membuat hubungan dengan tahap penyelesaian yang disediakan oleh amalan pustakawan. Kebolehgunaan ke domain lain dibenarkan selagi domain tersebut mengalami masalah yang berkaitan dengan teknikal, pengurusan, dan empirik yang sering dihadapi oleh pekerja. Penyelidikan ini menyumbang kepada kaedah menangkap pengetahuan tersirat dengan menggunakan pendekatan berasaskan kognitif untuk memastikan kelangsungan perniagaan dalam pelbagai domain.
Kata kunci: Kecerdasan Perniagaan, Pengurusan Pengetahuan, Pendekatan Berasaskan Kognitif, Fungsi Linguistik Sistematik, Pengetahuan Tersirat.
ABSTRACT
Tacit knowledge becoming a key issue in business intelligence approach to knowledge systems. Capturing the tacit knowledge is not a straightforward task, since it consists of unstructured data and related to a variety of information that is not always accessible through traditional means. This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. The data transformed into cognitive maps to supply the data warehouse. The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. The problems were then converted into a questionnaire to identify qualities of the problems such as frequency, urgency, severity, and importance. From the questionnaire results, the best tacit knowledge performers were identified. They are respondents who can solve the problems, while the majority of the respondents are unable to solve them. The best performers were then subjected to grammar targeted interview to collect the solutions they made to the problems. The transcription of the interview results is then converted into cognitive maps that visualize the solutions. These cognitive maps are then stored in a data warehouse and ready to collect anytime for analytics purposes. The framework is validated through Power BI and reviewed by seven experts. Its applicability to other domains is justified as long as the domain, e.g., manufacturing, have experienced problems related to technical, managerial, and empirical problems faced by employees at work. This research contributes to the methods of capturing tacit knowledge using a cognitive-based approach, which important to ensure the continuity of business in various domains.
Keywords: Business Intelligence, Knowledge Management, Cognitive-based Approach, Systemic Functional Linguistics, Tacit Knowledge.
ACKNOWLEDGEMENT
Firstly, I would like to express my sincere gratitude to my supervisor, Prof. Madya Ts. Dr. Azman B Ta'a for the continuous support of my Ph.D. study and related research, for his patience, motivation, and immense knowledge. His guidance helped me in all the time of research and writing of this thesis. I could not have imagined having a better supervisor and mentor for my Ph.D. study.
A special thanks to my wife and my son. Words cannot express how grateful I am to my family for all the sacrifices they’ve made on my behalf. Their prayer for me was what sustained me thus far. In the end, I would like to express appreciation to my beloved siblings, dad, mom, and my parents-in-law, who has supported me along the way.
My sincere thanks also go to my fellow doctoral students for their feedback, cooperation, and friendship. All my friends provided me an opportunity to share my research struggle and stimulate discussions. Without their precious support, it would not be possible to conduct this research.
TABLE OF CONTENTS
Permission to Use ... i
ABSTRAK ... ii
ABSTRACT ... iii
ACKNOWLEDGEMENT ... iv
TABLE OF CONTENTS ... v
List of Tables ... x
List of Figures ... xii
List of Appendices ... xvi
List of Abbreviations ... xvii
CHAPTER ONE INTRODUCTION ... 1
1.1 Background ... 1
1.2 The motivation of the Study ... 3
1.3 Problem Statement ... 6
1.4 Research Questions ... 10
1.5 Research Objectives ... 11
1.6 Research Gap ... 11
1.7 Research Strategy ... 13
1.7.1 Phase I – Defining the Capturing Issues in BI ... 13
1.7.2 Phase II – Develop Cognitive-Approach Method for Capturing Tacit Knowledge ... 15
1.7.3 Phase III – Evaluate the Cognitive Based Approach in BI ... 16
1.8 Contribution of the Study ... 16
1.8.1 Theoretical Contribution ... 17
1.8.2 Practical Contribution ... 18
1.9 Thesis Organization ... 19
CHAPTER TWO LITERATURE REVIEW ... 23
2.1 Introduction ... 23
2.2 Knowledge Management in Academic Libraries ... 25
2.3 Managing the Knowledge ... 28
2.4 Types of Knowledge ... 31
2.5 Capturing Tacit Knowledge ... 35
2.5.1 Capturing Tacit Knowledge Techniques ... 36
2.6 Intelligence in Information Technology... 44
2.6.1 Business Intelligence (BI) ... 45
2.6.2 Business Intelligence Framework ... 46
2.7 Data Sources... 51
2.8 Extraction, Transformation, Load (ETL) ... 52
2.9 Data Warehouse (DW) ... 54
2.10 Data Analysis in Business Intelligence ... 56
2.10.1 Type of Data Analysis ... 56
2.11 Tools Used in the Research ... 59
CHAPTER THREE COGNITIVE-BASED APPROACH FOR BUSINESS INTELLIGENCE FRAMEWORK ... 62
3.1 Introduction ... 62
3.2 Cognitive Approach ... 65
3.2.1 Cognitive Mapping ... 66
3.2.2 Cognitive Analytics ... 74
3.2.3 Cognitive Model ... 75
3.3 Theoretical Framework ... 76
3.3.1 Knowledge, Information, Data Model ... 79
3.4 Linguistic Source of Tacit ... 85
3.4.1 Phonological and Non-Verbal Source of Tacit ... 92
3.5 Contextual Resources ... 94
3.6 Systematic Literature Review ... 95
3.7 Conclusion ... 96
CHAPTER FOUR RESEARCH METHODOLOGY ... 98
4.1 Introduction ... 98
4.2 Research Methodology... 99
4.3 Research Methodology Summary ... 101
4.4 Design for Capturing Tacit Knowledge ... 104
4.5 Research Design ... 118
4.6 Conclusion ... 130
CHAPTER FIVE IMPLEMENTATION OF COGNITIVE-BASED APPROACH FOR BUSINESS INTELLIGENCE (COBASE-BI): CASE STUDY IN LIBRARY OF HIGHER EDUCATION ... 131
5.1 Introduction ... 131
5.2 Respondent Survey ... 133
5.3 Interview Result ... 134
5.4 Questionnaire Design ... 136
5.5 Questionnaire Data Acquisition ... 144
5.5.1 Problem Faced by Librarians (Q1 and Q2) ... 145
5.5.2 Inter librarian relationship (Q3 and Q4) ... 152
5.5.3 Librarian and Patrons Relationship (Q5 and Q6) ... 156
5.5.4 Emergency events (Q7 and Q8) ... 161
5.5.5 External Relations (Q9 and Q10) ... 167
5.5.6 Library service (Q11 and Q12) ... 170
5.6 Questionnaire Result ... 177
5.7 Second Interview ... 181
5.8 Second Interview Result ... 189
5.9 Cognitive-based Analysis... 190
5.9.1 Visitors do not know what they are searching for (PD6) ... 190
5.9.2 Fuss Among Visitors that not relevant with the library (PD8) ... 191
5.9.3 Less budget (PD9) ... 193
5.9.4 Limited collection for new books (PD10)... 194
5.9.5 Fewer Visitors (PD11) ... 196
5.9.6 Interruptions at work(PD16) ... 196
5.9.7 Social relations between staff are not good (PD20) ... 197
5.9.8 Staff also teaches (PD22) ... 198
5.9.9 Lazy Staff (PD24) ... 199
5.9.10 Providing information needed by visitors (SD1) ... 200
5.9.11 Literacy programs for students (SD2) ... 201
5.9.12 Computer courses for research (SD3) ... 202
5.9.13 Conservation of books (SD4) ... 203
5.9.14 Making information guide (SD8) ... 204
5.9.15 Development of collections (SD9) ... 205
5.9.16 Information Technology Course (SD14) ... 207
5.9.17 Creating Living and Crowd Library (SD15) ... 208
5.9.18 Data management (SD16) ... 209
5.9.19 Activities that create knowledge (SD17) ... 211
5.10 Lesson Learned ... 212
5.11 Cognitive-based Approach and Business Intelligence ... 213
5.12 Conclusion ... 224
CHAPTER SIX VALIDATION AND EVALUATION ... 226
6.1 Introduction ... 226
6.2 Data Collection for the Case Study ... 227
6.3 Data Modelling for Library Data Warehouse ... 229
6.4 Business Intelligence Descriptive Analysis ... 232
6.4.1 Problems Librarians face ... 232
6.4.2 Relationship between Librarians ... 236
6.4.3 Relationship between librarians and patrons ... 240
6.4.4 Emergency Situations in the library ... 242
6.4.5 External activities are undertaken by librarians ... 246
6.4.6 Providing services for librarians in the future ... 248
6.5 Cognitive Mapping for Business Intelligence ... 250
6.6 Cognitive Map ... 265
6.7 Business Intelligence and Predictive Analysis ... 269
6.8 Experts Review ... 275
6.8.1 The setting of The Questionnaires ... 275
6.8.2 Expert Review Results ... 277
6.8.3 Analysis of Comments ... 281
6.8.3.1 Compliments about the research... 282
6.8.3.2 Enhancement ... 284
6.9 Summary and General Findings ... 287
6.10 Conclusion ... 289
CHAPTER SEVEN CONCLUSION AND RECOMMENDATION ... 291
7.1 Research Objectives Examination... 291
7.2 Method to Capture Tacit Knowledge ... 292
7.3 Construction of a Capturing and Codifying Tacit Knowledge Framework for Managing Tacit Knowledge ... 293
7.4 Evaluation of the Capturing and Codifying Tacit Knowledge Framework ... 295
7.5 Research Contribution ... 295
7.5.1 Review of the Current Status of HEI Libraries in Indonesia ... 296
7.5.2 Design of a Framework that Capture Tacit Knowledge for BI Purposes 296 7.5.3 Application of Capturing Tacit Knowledge in BI Field ... 297
7.6 Research Limitations ... 299
7.6.1 The Use of Librarians as Research Sample ... 299
7.6.2 The Use of Interview as the Tool to Capture Tacit Knowledge ... 299
7.7 Further Research ... 300
7.7.1 Consolidation Method ... 301
7.7.2 Further Exploration of the Framework ... 301
7.7.3 The Impact of Tacit Knowledge for Enterprise and Decision Making Process ... 301
7.7.4 Real Data from Other Disciplines ... 302
REFERENCES ... 303
List of Tables
Table 2.1: Summary of techniques for capturing and converting tacit knowledge
(Pourzolfaghar, Ibrahim, Abdullah, & Adam, 2014) ... 38
Table 3.1: Summary of traditions in linguistics and its relations to capturing tacit knowledge ... 87
Table 4.1: Summary of Research Methodology ... 102
Table 4.2: Previous Research ... 107
Table 5.1: Research Sample ... 133
Table 5.2: First Stage Interview Results and Basic Materials for the Questionnaire ... 137
Table 5.3: Problems frequency that faced by librarians ... 145
Table 5.4: Difficulty level problems faced by librarians ... 147
Table 5.5: Matrix Combination of Frequency and Difficulty of Problems ... 148
Table 5.6: Urgency Value of each problem ... 149
Table 5.7: Detailed Respondents' Answers for Every Urgent Problem ... 151
Table 5.8: Frequency of Relations between Librarians ... 153
Table 5.9: Importance of Activities among Librarians ... 133
Table 5.10: Matrix of Combination of Frequency and Interest of Activities ... 155
Table 5.11: Urgency Value of each activity ... 156
Table 5.12: Frequency of Relationships between Librarians and Patrons ... 157
Table 5.13: Importance of Relationship between Librarians and Patrons ... 158
Table 5.14: Matrix of Combination of Frequency and Interests of Activities ... 159
Table 5.15: Urgency Value of each activity ... 160
Table 5.16: Frequency of Emergency Events in the Library ... 161
Table 5.17: Level of Readiness in Dealing with Emergency Situations ... 163
Table 5.18: Matrix of Combination of Frequency and Event Readiness ... 164
Table 5.19: Urgency Value of Each Problem ... 165
Table 5.20: Frequency of External Activities Undertaken by Librarians ... 167
Table 5.21: Importance of Librarian external activities ... 168
Table 5.22: Matrix of Combination of Frequency and Difficulty of Problems ... 169
Table 5.23: Value of the Urgency of Each Problem ... 170
Table 5.24: Degree of Interest Problems Faced by Librarians ... 170
Table 5.25: Difficulty Levels Problems Faced by Librarians ... 172
Table 5.26: Matrix of Combination of Interest and Problem Difficulty ... 173
Table 5.27: Urgency Value of each service ... 174
Table 5.28: Detailed Respondents' Answers for Each Urgent Problem ... 176
Table 5.29: Questionnaires Result ... 177
Table 5.30 Samples for Second Interview ... 182
Table 6.1: Problems faced by librarians ... 233
Table 6.2: Relationship between librarians ... 237
Table 6.3: Relationship between librarians and patrons ... 240
Table 6.4: Emergencies in the library ... 243
Table 6.5: External activities undertaken by librarians ... 246
Table 6.6: Provision of services for libraries in the future ... 249
Table 6.7: The number and percentage of experts and answers who supported (“Yes”), opposed (“No), and were “Neutral” to the questions on the capabilities of the methodology ... 277
Table 6.8: Themes and Frequencies of Qualitative Comments as Shared by Experts ... 284
List of Figures
Figure 1.1: Proposed Framework: Data Management Using Cognitive Approach ... 12
Figure 1.2: Research Strategy ... 14
Figure 2.1: Differentiation among Explicit, Implicit, and Tacit Knowledge (Nickols,2013) 31 Figure 2.2: Relationship among Data, Information, Knowledge, and Wisdom (Bellinger, 2004) ... 34
Figure 2.3: Inputs and Outputs of Business Intelligence (Nguyen, 2011) ... 45
Figure 2.4: Gartner BI Framework (February, 2019) ... 50
Figure 2.5: The Multi-Layer BI Framework (February, 2019) ... 49
Figure 2.6: Business Intelligence Architecture ... 61
Figure 2.7: ETL processes (Xu & Yu-Shi, 2016) ... 54
Figure 2.8: Magic Quadrant for Analytics and Business Intelligence Platforms (Gartner, 2020) ... 61
Figure 3.1: Systemic Functional Linguistics (SFL) System (Nam & Park, 2015)... 65
Figure 3.2: Managing the Knowledge Model (Egbu, Hari, & Renukappa, 2005; Hernandez- Matias, Vizan, Perez-Garcia, & Rios, 2008) ... 67
Figure 3.3: Semantic map for different types of transportation (Esfahanipour & Montazemi, 2015) ... 70
Figure 3.4: Example of a causal map (Pillutla & Giabbanelli, 2019) ... 70
Figure 3.5: Concept map for plants (Esfahanipour & Montazemi, 2015)... 71
Figure 3.6: A cognitive model of the memory system (Sato & Huang, 2015a)... 80
Figure 3.7: The proposed generic KID Model (Sato & Huang, 2015b) ... 81
Figure 3.8: KID Model (Sato & Huang, 2015b) ... 82
Figure 3.9: Research Data Collection Scheme ... 84
Figure 3.10: Flow of Capturing Tacit Knowledge for Business Intelligence ... 95
Figure 3.11: Cognitive-based Approach for Business Intelligence (Cobase-BI) framework 95 Figure 4.1: Design for Capturing Tacit Knowledge... 112
Figure 4.2 General flow of information to collect problem-focused tacit data ... 114
Figure 4.3: Comprehensive tacit data collection ... 116
Figure 4.4: Simple Diagram for Tacit Knowledge Capturing ... 118
Figure 4.5 Scope of tacit knowledge ... 119
Figure 4.6: Research Design ... 120
Figure 5.1: PD6 Cognitive Map based on two respondents’ Tacit Knowledge ... 190
Figure 5.2: PD8 Cognitive Map based on two respondents’ Tacit Knowledge ... 192
Figure 5.3: PD9 Cognitive Map based on one of respondent's Tacit Knowledge ... 194
Figure 5.4: PD10 Cognitive Map based on three respondents’ Tacit Knowledge ... 195
Figure 5.5: PD11 Cognitive Map based on three respondents’ Tacit Knowledge ... 196
Figure 5.6: PD16 Cognitive Map based on one respondent's Tacit Knowledge ... 197
Figure 5.7: PD20 Cognitive Map based on one of respondent's Tacit Knowledge ... 198
Figure 5.8 PD22: Cognitive Map based on one of respondent's Tacit Knowledge ... 199
Figure 5.9: PD24 Cognitive Map based on one of respondent's Tacit Knowledge ... 200
Figure 5.10: SD1 Cognitive Map based on one of respondent's Tacit Knowledge ... 200
Figure 5.11: SD2 Cognitive Map based on one of respondent's Tacit Knowledge ... 201
Figure 5.12: SD3 Cognitive Map based on one of respondent's Tacit Knowledge ... 202
Figure 5.13: SD4 Cognitive Map based on three respondents’ Tacit Knowledge ... 203
Figure 5.14: SD8 Cognitive Map based on four respondents’ Tacit Knowledge ... 205
Figure 5.15: SD9 Cognitive Map based on three respondents’ Tacit Knowledge ... 206
Figure 5.16: SD14 Cognitive Map based on one of respondent's Tacit Knowledge ... 207
Figure 5.17: SD15 Cognitive Map based on one of respondent's Tacit Knowledge ... 208
Figure 5.18: SD16 Cognitive Map based on two respondents’ Tacit Knowledge ... 209
Figure 5.19: Visual Management Example ... 210
Figure 5.20: SD17 Cognitive Map based on three respondents’ Tacit Knowledge ... 211
Figure 5.21: Enhanced BI Framework comprising of tacit knowledge as the final output the research ... 216
Figure 5.22: Steps in capturing tacit knowledge ... 227
Figure 5.23: Tools for capturing tacit knowledge ... 219
Figure 5.24: Cognitive Map algorithm flowchart ... 223
Figure 6.1: Institutions of the Librarians ... 227
Figure 6.2: Potential Number of Patrons of the Librarians ... 228
Figure 6.3: Problem Difficulties Data Warehouse Design... 231
Figure 6.4: Frequency of problems librarians face ... 234
Figure 6.5: Ease of resolving problems librarians face ... 235
Figure 6.6: Difficulty in resolving problems librarians face ... 236
Figure 6.7: Importance of the phenomenon that requires knowledge transfer among librarians ... 238
Figure 6.8: Difficulty of resolving phenomenon that requires knowledge transfer among librarians ... 239
Figure 6.9: Frequency of phenomenon that required knowledge communication between
librarians and readers ... 241
Figure 6.10: Importance of the phenomenon that required knowledge communication between librarians and readers ... 242
Figure 6.11: Frequency of events or phenomenon classified as an emergency in the library ... 244
Figure 6.12 level of preparation to manage emergency events or phenomenon in the library (A) ... 245
Figure 6.13: Level of preparation to manage emergency events or phenomenon in the library (B) ... 246
Figure 6.14: Frequency of the phenomenon required coordination between librarians and the surrounding environment, organizations, or other libraries ... 247
Figure 6.15: Importance of the phenomenon that required coordination between librarians and surrounding environment, organizations, or other libraries ... 248
Figure 6.16: Ease of providing new services for libraries in the future ... 249
Figure 6.17: Difficulty in providing new services for libraries in the future ... 250
Figure 6.18: Visitors did not know what they were searching for ... 253
Figure 6.19: Fuss among visitors that are not relevant to the library ... 254
Figure 6.20: Frequency of not good social relationship between staff and Less Budget ... 255
Figure 6.21: Difficulty of not good social relationship between staff and Less Budget ... 256
Figure 6.22: Frequency of interruption at work and limited collection for new books ... 257
Figure 6.23: Difficulty in resolving interruption at work and limited collection for new books ... 257
Figure 6.24: Frequency of staff also teaches, and social relations between staff were not good ... 258
Figure 6.25: Difficulty of resolving staff also teaches, and social relations between staff were not good ... 259
Figure 6.26: Frequency of lazy staff ... 260
Figure 6.27: Difficulty in resolving lazy staff ... 260
Figure 6.28: Frequency of providing the information needed by visitors, literacy programs for students, and computer courses for research ... 261
Figure 6.29: Difficulty in resolving to provide the information needed by visitors, literacy programs for students, and computer courses for research ... 262
Figure 6.30: Frequency of making information guide, development of collections, conservation of books ... 263
Figure 6.31: Difficulty of resolving making information guide, development of collections,
conservation of books ... 263
Figure 6.32: Frequency of occurrence of information technology course, data management and creating living and crowd library ... 264
Figure 6.33: Difficulty of resolving information technology course, data management, and creating living and crowd library ... 265
Figure 6.34: Cognitive mapping showing lazy staffs in library ... 266
Figure 6.35: Cognitive mapping showing percentage of librarians involved ... 267
Figure 6.36: Cognitive mapping showing patrons did not know what they were searching for ... 268
Figure 6.37: Cognitive mapping showing patrons did not know what they were searching for ... 269
Figure 6.38: Prediction for Fuss among Visitors that were not relevant to the library ... 271
Figure 6.39: Lazy Staff ... 272
Figure 6.40: Visitors did not know what they were searching for ... 273
Figure 6.41: Computer courses for research ... 273
Figure 6.42: Conservation of books ... 274
Figure 6.43: Providing information needed by visitors ... 275
Figure 6.44: Answers Based on KM Experience of the Experts ... 278
Figure 6.45: Answers Based on BI Experience of the Experts ... 279
Figure 6.46: The Most and Least Answered “Yes” Questions Answers ... 280
Figure 6.47: All Expert Reviews Feedbacks (N = 7) ... 281
List of Appendices
Appendix A
Appendix A.1 First Interview Guide ... 331
Appendix A.2 Consent Form ... 337
Appendix A.3 Questionnaire ... 346
Appendix A.4 Questionnaire Datasheet ... 360
Appendix B Data Warehouse Model Appendix B.1 Problem Difficulty & Frequency Data Warehouse Model ... 368
Appendix B.2 Peer Communication Importance& Frequency Data Warehouse Model…..369
Appendix B.3 Patron Communication Importance& Frequency Data Warehouse Model...370
Appendix B.4 Emergency Preparedness& Frequency Data Warehouse Model...371
Appendix B.5 Environment Relation Importance& Frequency Data Warehouse Model...372
Appendix B.6 Service ImportanceDifficulty & Frequency Data Warehouse Model...373
Appendix C Business Intelligence Descriptive Dashboards ... 374
Appendix D Business Intelligence Cognitive Mapping Dashboards ... 382
Appendix E Business Intelligence Service Difficulty Likelihood Analysis ... 401
Appendix F Business Intelligence Problem Difficulty Likelihood Analysis ... 410
Appendix G Questionnaire for Experts Review ... 418
List of Abbreviations
Acronym Meaning
AI Artificial Intelligence AKPAR Akademi Pariwisata
AMIK Akademi Manajemen Informatika dan Komputer BI Business Intelligence
CCTV Closed-Circuit Television CM Cognitive Map
CTI Content Targeted Interview CTK Comprehensive Tacit Knowledge CTQ Content Targeted Questioning DBA Database Administrators DM Data Mining
DSS Decision Support System DW Data Warehouse
EF Emergency Frequency EP Emergency Preparedness
ERF Environmental Relations Frequency ERI Environmental Relations Importance ETL Extract, Transform, and Load
FDIII Fakultas Diploma III
FE FakutlasEkonomi
FKIP FakutlasIlmu Pendidikan GTI Grammar Targeted Interview GTQ Grammar Targeted Questioning HEI Higher Education Institutions IS Information System
IT Information Technology
KB Knowledge Bank
KID Knowledge, Information, and Data
KM Knowledge Management
KMS Knowledge Management System LCM Linguistic Categorization Model MFA Most Frequent Answer
NCF Patron Communication Frequency NCI Patron Communication Importance OLAP Online Analytical Processing OLTP Online Transaction Processing PCI (a) Peer Cognitive Interviews
PCI (b) Peer Communication Importance PCF Peer Communication Frequency PD Problem Difficulty
PF Problem Frequency PO Participant Observation
RDBMS Repository Data Base Management Systems SD Service Difficulty
SECI Socialization, Externalization, Combination, and Internalization SFL Systemic Functional Linguistics
SI Service Importance
SLR Systematic Literature Review SOP Standard Operating Procedures STAI Sekolah Tinggi Agama Islam STH Sekolah Tinggi Hukum STIE Sekolah Tinggi IlmuEkonomi STIKES Sekolah Tinggi Ilmu Kesehatan
STKIP Sekolah Tinggi Keguruan dan Ilmu Pendidikan
STMIK Sekolah Tinggi ManajemenInformatika dan Komputer STQ Semantic Targeted Questioning
UNIV Universitas
CHAPTER ONE INTRODUCTION
This chapter presents the background, problem statement, and motivation of this research. The chapter defines the research problems, the research gaps, and the research questions and objectives. Then, the research strategy is discussed in three phases, followed by the scope and the research contributions. This chapter ends with an overview of the thesis organization and a summary of the thesis.
1.1 Background
Business intelligence (BI) is a crucial part of the knowledge system in business operations. BI becomes an essential aspect of an organization that produces knowledge for decision purposes. The knowledge production comes from various tasks of analysis that required well-defined structured data. However, there has been a problem in the integration of the new types of data with internal transactional data such as motion data and uncaptured data, which consist of various types of structured and unstructured data (Raghupathi & Raghupathi, 2014). The evolution in business is mandatory to match the pace of global requirements. However, using technology as a solution to enhance the business is a significant challenge considering that every organization has individual and organizational knowledge either in the form of raw data or in the form of information. However, BI has the most significant function of data analysis for transforming the raw data into knowledge. Dearth research had been conducted to explore the use of knowledge and manage it as a new raw data to manage within BI and its applicability within various application domains.
REFERENCES
Abdullah, M. S. (2002). Knowledge modelling techniques for developing knowledge management systems. Third European Conference on Knowledge Managemnt: Trinity College Dublin, Ireland, 24-25 September 2002, (p. 17).
Abernethy, M. A., Horne, M., Lillis, A. M., Malina, M. A., & Selto, F. H. (2005). A multi-method approach to building causal performance maps from expert knowledge. Management Accounting Research, 16(2), 135–155.
https://doi.org/10.1016/j.mar.2005.03.003.
Addis, M. (2016). Tacit and explicit knowledge in construction management.
Construction Management and Economics, 34(7–8), 439–445.
https://doi.org/10.1080/01446193.2016.1180416
Afolayan, O. T. (2020). A Framework for Action to Improve Tacit Knowledge Sharing in Nigeria’s Higher Education Institutions. Journal of Information Science, 12.
Al Rashdi, S. S., & Nair, S. S. K. (2017). A business intelligence framework for Sultan Qaboos University: A case study in the Middle East. Journal of Intelligence Studies in Business, 7(3). https://doi.org/10.37380/jisib.v7i3.278 Almurashi, A. W. (2016). An Introduction to Halliday’s Systemic Functional
Linguistics. Journal for the Study of English Linguistics, 4(1), 70–81.
https://doi.org/10.5296/jsel.v4i1.9423
Alonderiene, R. A. (2006). Tacit knowledge acquisition and transfer in the process of informal learning. Problems and perspectives in management , 4 (3), 134- 145.
Andersen, D. F., & Richardson, G. P. (1997). Scripts for group model building.
System Dynamics Review, 13(2), 107–129. https://doi.org/10.1002/(sici)1099- 1727(199722)13:2<107::aid-sdr120>3.0.co;2-7.
Ansari, F., Glawar, R., & Nemeth, T. (2019). PriMa: A prescriptive maintenance model for cyber-physical production systems. International Journal of Computer Integrated Manufacturing, 32(4–5), 482–503.
https://doi.org/10.1080/0951192X.2019.1571236
Avdimiotis, S. (2019). Emotional intelligence and tacit knowledge management in hospitality. Journal of Tourism, Heritage & Services Marketing, 5(2), 3–10.
https://doi.org/10.5281/ZENODO.3601651
Awad, E. M. & Ghaziri, HM. (2007). Knowledge Management. Upper Saddle River:
Pearson Education Inc.
Aziz, R. F., & Hafez, S. M. (2013). Applying lean thinking in construction and performance improvement. Alexandria Engineering Journal, 52(4), 679–695.
https://doi.org/10.1016/j.aej.2013.04.008
Bakar, M. S. A. & Ta’a, A. (2014). Business Intelligence Modelling for Graduate Enterpreneur Programme. Journal of Information and Communication Technology (JICT), 13(1), 55–86
Balasubramanian, P. K. N., Henderson, J. C. & Kwan, M. M. (1999). Managing process knowledge for decision support. Decision Support Systems, 27(1–2), 145–162.
Batra, D. (2018). Agile values or plan-driven aspects: Which factor contributes more toward the success of data warehousing, business intelligence, and analytics project development? Journal of Systems and Software, 146, 249–262.
https://doi.org/10.1016/j.jss.2018.09.081
Bear, A., & Knobe, J. (2017). Normality: Part descriptive, part prescriptive.
Cognition, 167, 25–37. https://doi.org/10.1016/j.cognition.2016.10.024
Becerra-Fernandez, I., Gonzalez, A. J. and Sabherval, R. (2004). Knowledge Management. Prentice Hall, Upper Saddle River.
Bedi, S., & Walde, C. (2017). Transforming Roles: Canadian Academic Librarians Embedded in Faculty Research Projects. College & Research Libraries, 78(3), 314. https://doi.org/10.5860/crl.78.3.314
Bellinger, G., Castro, D., & Mills, A. (2004). Data, information, knowledge, and wisdom. 47
Bidin, M. A. F., & Yunus, A. M. (2018). Business Intelligence Using Data Mining for Organizational Sustainability: A Case Study of Digi Telecommunication Sdn Bhd. International Journal of Academic Research in Business and Social Sciences, 7(12), Pages 471-485. https://doi.org/10.6007/IJARBSS/v7- i12/3628
Boileau, N., & Herbst, P. (2011). How Teachers Evaluate Breaches of Norms in High School Geometry. In NCTM.
Bolloju, N. M. K. & Turban, E. (2002). Integrating knowledge management into eterprise environments for the next generation decision support. Decision Support Systems, 33(2), 163–176.
Boose, J. H. (1989). A survey of knowledge acquisition techniques and tools.
Knowledge Acquisition, 1, 3–37.
Bowman, G., MacKay, R. B., Masrani, S., & McKiernan, P. (2013). Storytelling and the scenario process: Understanding success and failure. Technological Forecasting and Social Change, 80(4), 735–748.
https://doi.org/10.1016/j.techfore.2012.04.009
Bradshaw, J. M., Ford, K. M. Adams-Webber, J. R. & Boose, J. H. (1993). Beyond the repertory grid: New approaches to constructivist knowledge acquisition tool development. International Journal of Intelligent Systems, 8(2), 287–
333.
Branin, J. (2003). Knowledge Management in Academic Libraries : Building the Knowledge Bank at the Ohio State University. Journal of Library Administration, 39(4), 41–56.
Bratianu, C. (2019). Exploring Managerial Decision Making through the Lens of Knowledge Dynamics. Strategica: Upscaling Digital Transformation in Business and Economics, 427–433.
Brewer, P. D., & Brewer, K. L. (2010). Knowledge Management, Human Resource Management, and Higher Education: A Theoretical Model. Journal of Education for Business, 85(6), 330–335.
https://doi.org/10.1080/08832321003604938
Burgess, D. (2005). What Motivates Employees to Transfer Knowledge Outside Their Work Unit? Journal of Business Communication, 42(4), 324–348.
https://doi.org/10.1177/0021943605279485
Burnette, M. (2017). Tacit knowledge sharing among library colleagues: a pilot study. Reference Services Review, 45(3), 382–397.
https://doi.org/10.1108/rsr-11-2016-0082
Busch, P. (2006). Organization design and tacit knowledge transferal: An examination of three IT firms. Journal of Knowledge Management Practice, 7(2). Retrieved from http://www.tlainc.com/jkmp.htm
Bustamante, A., Sebastia, L., & Onaindia, E. (2019). Can Tourist Attractions Boost Other Activities Around? A Data Analysis through Social Networks. Sensors, 19(11), 2612. https://doi.org/10.3390/s19112612
Campbell, H. M. (2010). The liberation of intellectual capital through the natural evolution of knowledge management systems. 2010 2nd IEEE International Conference on Information Management and Engineering. Chengdu, China:
IEEE. https://doi.org/10.1109/icime.2010.5478008
Carson, M. C., Harrington, M. E., Thompson, N., O'Connor, J. J. & Theologis, T. N.
(2001). Kinematic analysis of a multi-segment foot model for research and clinical applications: A repeatability analysis. Journal of Biomechanics, 34(10), 1299–1307.
Chandiok, A., & Chaturvedi, D. K. (2016). Cognitive Decision Support System for medical diagnosis. 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).
New Delhi, India: IEEE. https://doi.org/10.1109/icctict.2016.7514604
Chandiok, A., & Chaturvedi, D. K. (2016). Cognitive Decision Support System for medical diagnosis. 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 337–342. https://doi.org/10.1109/ICCTICT.2016.7514604
Chatti, M. A., Schroeder, U., & Jarke, M. (2012). LaaN: Convergence of Knowledge Management and Technology-Enhanced Learning. IEEE Transactions on Learning Technologies, 5(2), 177–189. https://doi.org/10.1109/tlt.2011.33.
Chaudhuri, S., Dayal, U., &Narasayya, V. (2011). An overview of business intelligence technology. Communications of the ACM, 54(8), 88–98.
https://doi.org/10.1145/1978542.1978562
Chen, Chiang, &Storey. (2012b). Business Intelligence and Analytics: From Big Data to Big Impact. MIS Quarterly, 36(4), 1165.
https://doi.org/10.2307/41703503
Chen, H. (1992). Knowledge-based document retrieval framework and design.
Journal of Information Sciecnce, 18(4), 293–314.
Chen, R., Blomqvist, H., Koch, S., & Skyttberg, N. (2017). Exploring Vital Sign Data Quality in Electronic Health Records with Focus on Emergency Care
Warning Scores. Applied Clinical Informatics, 08(03), 880–892.
https://doi.org/10.4338/aci-2017-05-ra-0075
Cheng, C., Zhong, H., & Cao, L. (2020). Facilitating speed of internationalization:
The roles of business intelligence and organizational agility. Journal of
Business Research, 110, 95–103.
https://doi.org/10.1016/j.jbusres.2020.01.003
Cheng, C.-Y., Ou, T.-Y., Chen, T.-L., & Chen, Y.-Y. (2014). Transferring cognitive apprenticeship to manufacturing process knowledge management system.
VINE, 44(3), 420–444. https://doi.org/10.1108/vine-03-2013-0011.
Cheng, L., & Cheng, P. (2011). Integration: Knowledge Management and Business Intelligence. 2011 Fourth International Conference on Business Intelligence and Financial Engineering. Wuhan, China: IEEE.
https://doi.org/10.1109/bife.2011.172
Chu, H. C. & Hwang, G. (2008). A Delphi-based approach to developing study of knowledge management system with the cooperation of multiple experts.
Expert Systems with Applications, 34(4), 2826–2840.
Chu, H. C.& Hwang, G. (2006). A Delphi-based approach to developing expert systems with the cooperation of multiple experts. Expert Systems with Applications, 34(4), 2826–2840. https://doi.org/10.1016/j.eswa.2007.05.034 Chugh, R. (2017). Barriers and Enablers of Tacit Knowledge Transfer in Australian
Higher Education Institutions. International Journal of Education and Learning Systems, 2, 272–276.
Clarke, T., & Rollo, C. (2001). Corporate initiatives in knowledge management.
Education + Training, 43(4/5), 206–214.
https://doi.org/10.1108/00400910110399201
Colicchia, C., & Strozzi, F. (2012). Supply chain risk management: a new methodology for a systematic literature review. Supply Chain Management:
An International Journal, 17(4), 403–418.
https://doi.org/10.1108/13598541211246558
Coppedge, B. B. (2010). Transferring tacit knowledge with the movement of people:
A delphi study (Order No. 3448393). Available from ProQuest Dissertations
& Theses Global. (860122271). Retrieved from
http://eserv.uum.edu.my/docview/860122271?accountid=42599.
Cox, B. L., & Jantti, M. (2012). Capturing business intelligence required for targeted marketing, demonstrating value, and driving process improvement. Library &
Information Science Research, 34(4), 308–316.
https://doi.org/10.1016/j.lisr.2012.06.002
Cox, B., & Jantti, M. (2012). Capturing business intelligence required for targeted marketing , demonstrating value , and driving process improvement. Library and Information Science Research, 34(4), 308–316.
Creswell, W. (2007). Qualitative Inquiry & Research Design: Choosing Among Five Approaches. Thousand Oaks, CA: Sage Publications.
Ćurko K., Vukšić V. B. & Merkaš V. (2016). Application of Business Intelligence Technology in Croatian companies: Preliminary research and Case study.
WSEAS Transactions on Business and Economics. Volume 13, 2016. E- ISSN: 2224-2899
Curko, K., Vuksic, V., & Merkas, Z. (2016). Usage of business intelligence technology in croatia: Preliminary research. WSEAS Transactions on Business and Economics, 13, 591–596.
Daland, H. (2016). Managing Knowledge in Academic Libraries Are we? Should we? LIBER QUARTERLY, 26(1), 28–41. https://doi.org/10.18352/lq.10154.
Davenport, T. H. (2015) Process Management for Knowledge Work. In: Brocke, V.
J., & Rosemann, M. Handbook on Business Process Management 1:
Introduction, Methods, and Information Systems (International Handbooks on Information Systems) (2nd ed. 2015 ed.). Berlin, Heidelberg: Springer Davidson, C. (2009). Transcription: Imperatives for Qualitative Research.
International Journal of Qualitative Methods, 8(2), 35–52.
https://doi.org/10.1177/160940690900800206
Day, E. (2002). Me, My * self and I : Personal and Professional Re-Constructions in Ethnographic Research. Forum: Qualitative Social Research, 3(3), 1–23.
De Mauro, A., Greco, M., Grimaldi, M., & Ritala, P. (2018). Human resources for Big Data professions: A systematic classification of job roles and required skill sets. Information Processing & Management, 54(5), 807–817.
https://doi.org/10.1016/j.ipm.2017.05.004.
de Saussure, L., & Rocci, A. (2016). Verbal communication . An introduction. In A.
Rocci & L. de Saussure (Eds.), Verbal Communication (Vol. 3, pp. 3–20).
Berlin: De Gruyter
Deshpande, P. S., Sharma, S. C., & Peddoju, S. K. (2019). Security and Data Storage Aspect in Cloud Computing (Vol. 52). Springer Singapore.
https://doi.org/10.1007/978-981-13-6089-3
Dimzov, S., Matošić, M., & Urem, I. (2021). University rankings and institutional affiliations: Role of academic librarians. The Journal of Academic Librarianship, 47(5), 102387. https://doi.org/10.1016/j.acalib.2021.102387 Dixon, C., Green, J., Yeager, B., Baker, D., & Franquiz, M. (2000). “ I Used To
Know That ”: What Happens When Reform Gets Through The Classroom Door. Bilingual Research Journal, 24(1&2), 1–14.
Dong Sihui, & Xu Xueguo. (2016). Research on tacit knowledge mining of university libraries based on data mining. 2016 13th International Conference on Service Systems and Service Management (ICSSSM). Kunming, China:
IEEE. https://doi.org/10.1109/icsssm.2016.7538426.
Ducharme, F. A. M. & Angelleli, L. A. (2014). Cognitive Analytics: A Step Towards Tacit Knowledge? Journal of Systemics, Cybernetics and Informatics, 12(4), 32 - 38.
Egbu, C. O., Hari, S., & Renukappa, S. H. (2005). Knowledge management for sustainable competitiveness in small and medium surveying practices.
Structural Survey, 23(1), 7–21. https://doi.org/10.1108/02630800510586871 Elliott, C., Dewland, J., Martin, J. R., Kramer, S., & Jackson Sr., J. J. (2016).
Collaborate and Innovate: The Impact of Academic Librarians on the Commercialization of University Technology. Journal of Library Administration, 57(1), 36–48.
https://doi.org/10.1080/01930826.2016.1215674
Esfahanipour, A., & Montazemi, A. R. (2015). Application of Cognitive Map in Knowledge Management. In Khosrow-Pour, D.B.A., M. (Ed.), Encyclopedia of Information Science and Technology, Third Edition (pp. 1112-1122). IGI Global. http://doi:10.4018/978-1-4666-5888-2.ch106
Faradillah, F., Ermatita, E., & Rini, D. P. (2020). Knowledge Management Barriers
in Higher Education: Strategic Issues at Private University. Proceedings of the Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019). Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019), Palembang, Indonesia. https://doi.org/10.2991/aisr.k.200424.027
Farzaneh, M., Isaai, M. T., Arasti, M. R., & Mehralian, G. (2018). A framework for developing business intelligence systems: A knowledge perspective.
Management Research Review, 41(12), 1358–1374.
https://doi.org/10.1108/MRR-01-2018-0007
Fatima, A., & Linnes, C. (2019). The Status of Business Intelligence in Small and Medium Size Enterprises in Norway. American Journal of Information Technology, 9(2), 1–25.
February, S. (2018). A Best Practise Business Intelligence Framework for the Telecommunications Industry: An Empirical Study. International Journal of Strategic Decision Sciences, 9(2), 38–53.
Fenton-O’Creevy, M., & van Mourik, C. (2016). ‘I understood the words but I didn’t know what they meant’: Japanese online MBA students’ experiences of British assessment practices. Open Learning: The Journal of Open, Distance
and e-Learning, 31(2), 130–140.
https://doi.org/10.1080/02680513.2016.1177503
Ferreira, D. R., &Simoes, P. (2016). A Rule-Based Approach to the Implementation of Business Processes in Normalized Systems. 2016 IEEE 18th Conference on Business Informatics (CBI). Paris, France: IEEE.
https://doi.org/10.1109/cbi.2016.32.
Forey, G (2014) Offshore outsourcing: The need for applicable linguistics. In:
Bhatia, V, Bremner, S (eds) Professional Communication Handbook. Oxon:
Routledge, pp. 382–399
Fourie, L. C. H., Schilawa, J. & Cloete, E. (2004). The value of concept maps for knowledge management in the banking and insurance industry. In Proceedings of the First International Conference on Concept Mapping (Cañas AJ, Novak JD, Gonzalez FM, Eds), Pamplona, Spain.
François, J. (2018). The Stance of Systemic Functional Linguistics Amongst
Functional ( ist ) Theories of Language and Its ‘ Systemic ’ Purpose. In Perspectives from Systemic Functional Linguistics (pp. 6–25). London:
Routledge
Gartner. (2020). 2020 Gartner Magic Quadrant for Analytics and Business Intelligence Platforms. Microsoft Corporation. Retrieved from https://info.microsoft.com/ww-landing-2020-gartner-magic-quadrant-for-
analytics-and-business-intelligence.html?LCID=EN-US
Georgiou, I., Heck, J., & Mrvar, A. (2018). The Analysis of Interconnected Decision Areas: A Computational Approach to Finding All Feasible Solutions. Group Decision and Negotiation, 28(3), 543–563. https://doi.org/10.1007/s10726- 018-9607-5
Geromin, M. H. (2015). Tacit knowledge sharing at Higher Education Institutions and its impact on the creation of new competitive niches. A Doctor of Philosophy Thesis. School of Management. University of Bath.
Geromin, M. H. (2015). Tacit knowledge sharing at Higher Education Institutions and its impact on the creation of new competitive niches [Doctoral Dissertation]. University of Bath.
Ghafar, N. A., & Idris, N. (2018). Reflection Of Doing Post Modern Ethnographic Research On The Dilemmas Of Working Omani Mothers. Jurnal Kemanusiaan, 16(1), 41–46.
Ghosh, R., Haider, S., & Sen, S. (2015). An integrated approach to deploy data warehouse in business intelligence environment. Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT). Hooghly, India: IEEE.
https://doi.org/10.1109/c3it.2015.7060115
Gil, J. M. (2016). A Relational Account of the Spanish Noun Phrase. Australian
Journal of Linguistics, 36(1), 22–51.
https://doi.org/10.1080/07268602.2016.1109429
Gioia, D. A., & Thomas, J. B. (1996). Identity, Image, and Issue Interpretation:
Sensemaking During Strategic Change in Academia. Administrative Science Quarterly, 41(3), 370. https://doi.org/10.2307/2393936
Giordano, R. G. P., Uricchio, V & Vurro, M. (2007). Integrating conflict analysis
and consensus reaching in a decision support system for water resource management. Journal of Environmental Management, 84(2), 213–228.
Gleason, J., Berg, M., & Huang, J. G. (2017). Patterns of oral Choice and Evaluation across secondary content areas. Language and Education, 32(2), 93–111.
https://doi.org/10.1080/09500782.2017.1391279
Goffin, K., &Koners, U. (2011). Tacit Knowledge, Lessons Learnt, and New Product Development. Journal of Product Innovation Management, 28(2), 300–318.
https://doi.org/10.1111/j.1540-5885.2010.00798.x
Gong, T., Baronchelli, A., Puglisi, A., & Loreto, V. (2011). Exploring the Roles of Complex Networks in Linguistic Categorization. Artificial Life, 18(1), 107–
121. https://doi.org/10.1162/artl_a_00051
Grant, K., & Dumay, J. (2015). Leading Issues in Knowledge Management Volume 2 (2nd ed.). Reading, United Kingdom: ACPIL
Gruber, T. R. (1993). A translation approach to portable ontology specifications.
Knowledge acquisition, 5(2), 199-220.
Gunjal, B. (2019). Knowledge Management: Why Do We Need it for Corporates.
SSRN Electronic Journal, 37–50. https://doi.org/10.2139/ssrn.3375572
Gupta, P., Mehrotra, D., & Sharma, T. K. (2018). Role of decision tree in supplementing tacit knowledge for Hypothetico-Deduction in higher education. International Journal of System Assurance Engineering and Management, 9(1), 82–90. https://doi.org/10.1007/s13198-016-0483-6
Guster, D. & Brown, C. G. (2012). The application of business intelligence higher education: Technical and managerial perspectives. Journal of Information Technology. vol. 23, pp. 42-62
Habibi, A., Sarafrazi, A., & Izadyar, S. (2014). Delphi Technique Theoretical Framework in Qualitative Research. The International Journal Of Engineering And Science, 3(4), 8–13.
Hadikusumo, B. H. W., & Rowlinson, S. (2004). Capturing Safety Knowledge Using Design-for-Safety-Process Tool. Journal of Construction Engineering and Management, 130(2), 281–289. https://doi.org/10.1061/(asce)0733- 9364(2004)130:2(281)
Haldin‐Herrgard, T. (2000). Difficulties in diffusion of tacit knowledge in
organizations. Journal of Intellectual Capital, 1(4), 357–365.
https://doi.org/10.1108/14691930010359252
Haldin-Herrgard, T. (2004). Diving Under the Surface of Tacit Knowledge.
Department of Management and Organization, Swedish School of Economics and Business Administration in Vasa, Finland. Retrieved from http://www.coalescentknowledge.com/WP/diving.pdf
Hartmann, E., Gemunden, H. G., & Alwis, R. S. (2004). The role of tacit knowledge in innovation management. Paper presented at the 2004 IMP-conference.
Retrieved from http://www.impgroup .org/uploads/papers/4585.pdf
Hassan, H. (2021). Impact of organisational factors on tacit knowledge sharing in HEIs: Focusing the mediating role of KM system quality. Management Science Letters, 1621–1628. https://doi.org/10.5267/j.msl.2020.12.010
Heisig, P., Suraj, O. A., Kianto, A., Kemboi, C., Perez Arrau, G., & Fathi Easa, N.
(2016). Knowledge management and business performance: global experts’
views on future research needs. Journal of Knowledge Management, 20(6), 1169–1198. https://doi.org/10.1108/jkm-12-2015-0521.
Hellsten, P., & Myllärniemi, J. (2019). Business Intelligence Process Model Revisited. Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 341–348. https://doi.org/10.5220/0008354503410348
Henkel, M. (2000). Academic identities and Policy Change in Higher Education.
Jessica Kingsley Publishers Ltd., London
Herbst, P., & Kosko, K. W. (2013). Using representations of practice to elicit mathematics teachers’ tacit knowledge of practice: a comparison of responses to animations and videos. Journal of Mathematics Teacher Education, 17(6), 515–537. https://doi.org/10.1007/s10857-013-9267-y
Hernandez-Matias, J. C., Vizan, A., Perez-Garcia, J., & Rios, J. (2008). An integrated modelling framework to support manufacturing system diagnosis for continuous improvement. Robotics and Computer-Integrated Manufacturing, 24(2), 187–199. https://doi.org/10.1016/j.rcim.2006.10.003 Herrera, F. E., Herrera, V. & Verdegay, J. (1996). A model of consensus in group
decision making under linguistic assesments. Fuzzy Sets and Systems, 78(1),
73–87.
Herschel, R. T., & Jones, N. E. (2005). Knowledge management and business intelligence: the importance of integration. Journal of Knowledge Management, 9(4), 45–55. https://doi.org/10.1108/13673270510610323.
Hjørland, B. (2018). Library and Information Science (LIS), Part 1. KNOWLEDGE ORGANIZATION, 45(3), 232–254. https://doi.org/10.5771/0943-7444- 2018-3-232
Hojas-Mazo, W., Simón-Cuevas, A., de la Iglesia Campos, M., Romero, F. P., &
Olivas, J. A. (2018). A Concept-Based Text Analysis Approach Using Knowledge Graph. In J. Medina, M. Ojeda-Aciego, J. L. Verdegay, D. A.
Pelta, I. P. Cabrera, B. Bouchon-Meunier, & R. R. Yager (Eds.), Information Processing and Management of Uncertainty in Knowledge-Based Systems.
Theory and Foundations (Vol. 854, pp. 696–708). Springer International Publishing. https://doi.org/10.1007/978-3-319-91476-3_57
Holford, W. D. (2018). An agential realist perspective on the construction and flow of knowledge: The case of dynamic entanglement and “cuts” within an aircraft engine manufacturing workplace. Journal of Knowledge Management, 22(7), 1442–1470. https://doi.org/10.1108/JKM-08-2017-0342 Holsapple, C., Lee-Post, A., & Pakath, R. (2014). A unified foundation for business
analytics. Decision Support Systems, 64, 130–141.
https://doi.org/10.1016/j.dss.2014.05.013
Huang, R., Sato, A., Tamura, T., Ma, J., & Yen, N. Y. (2014). Towards next- generation business intelligence: an integrated framework based on DME and KID fusion engine. Multimedia Tools and Applications, 76(9), 11509–11530.
https://doi.org/10.1007/s11042-014-2387-2
Hurwitz, J. S., Kaufman, M., & Bowles, A. (2015). Cognitive Computing and Big Data Analytics (1st ed.). Indianapolis, USA: John Wiley & Sons, Inc
Hurwitz, J., Kaufman, M., & Bowles, A. (2015). Cognitive computing and big data analytics. Wiley.
Imhoff, C., & White, C. (2013). Collaborative BI: Theory becomes reality. Business Intelligence Journal, 18(2), 40-46
Jaura, M., &Michailova, S. (2014). Cognition and knowledge sharing in post-
acquisition integration: insights from Indian IT acquiring firms. Journal of Asia Business Studies, 8(2), 146–167. https://doi.org/10.1108/jabs-05-2012- 0027
Jayakrishnan, M., Mohamad, A., & Yusof, M. (2018). Assimilation of Business Intelligence (BI) and Big Data Analytics (BDA) Towards Establishing Organizational Strategic Performance Management Diagnostics Framework:
A Case Study. Journal of Digital Information Management, 16(1), 22–32.
Jeni, P. R. J., Kennedy, R. P., & Sankaran, K. S. (2019). Reliable army knowledge management process using perception tacit knowledge with xenogeneic deep neural networks. Int. J. Knowledge Management Studies, 10(1), 48–57.
Jennex, M. E. (2015). Knowledge Management. Wiley Encyclopedia of Management, 1–6. https://doi.org/10.1002/9781118785317.weom070035 Jifaa, G. &Lingling, Z. (2014). Data, DIKW, Big data and Data science. 2nd
International Conference on Information Technology and Quantitative Management, ITQM.
Jin-Feng, W., Ming-Yan, C., Li-Jie, F., & Jun-Ju, Y. (2017). The Construction of Enterprise Tacit Knowledge Sharing Stimulation System Oriented to Employee Individual. Procedia Engineering, 174, 289–300.
https://doi.org/10.1016/j.proeng.2017.01.139
Jones, K., &Salo, D. (2018). Learning Analytics and the Academic Library:
Professional Ethics Commitments at a Crossroads. College & Research Libraries, 79(3), 304–323. https://doi.org/10.5860/crl.79.3.304
Kaisler, S. H., Espinosa, J. A., Armour, F., & Money, W. H. (2014). Advanced Analytics -- Issues and Challenges in a Global Environment. 2014 47th Hawaii International Conference on System Sciences. Waikoloa, Hawaii:
IEEE. https://doi.org/10.1109/hicss.2014.98
Kamoun-Chouk, S., Berger, H., & Sie, B. H. (2017). Towards Integrated Model of Big Data (BD), Business Intelligence (BI) and Knowledge Management (KM). In L. Uden, W. Lu, & I.-H. Ting (Eds.), Knowledge Management in Organizations (Vol. 731, pp. 482–493). Springer International Publishing.
https://doi.org/10.1007/978-3-319-62698-7_40
Kanehisa, M., Goto, S., Sato, Y., Kawashima, M., Furumichi, M., & Tanabe, M.
(2013). Data, information, knowledge and principle: back to metabolism in KEGG. Nucleic Acids Research, 42(D1), D199–D205.
https://doi.org/10.1093/nar/gkt1076
Karagiannis, A., Vassiliadis, P., &Simitsis, A. (2013). Scheduling strategies for efficient ETL execution. Information Systems, 38(6), 927–945.
https://doi.org/10.1016/j.is.2012.12.001
Kelly, J. E. (2015). Computing, cognition and the future of knowing How humans and machines are forging a new age of understanding. IBM Corporation.IBM
Global Services. Retrieved from https://cloud.report/Resources/Whitepapers/e55108d4-92bd-428a-b432-
64530b50c6b9_Computing_Cognition_WhitePaper.pdf
Khan, Z., &Vorley, T. (2017). Big data text analytics: an enabler of knowledge management. Journal of Knowledge Management, 21(1), 18–34.
https://doi.org/10.1108/jkm-06-2015-0238.
Koo, O. (2018). The Effect of Team-based Learning (TBL) on Leadership, Empowerment, and Followership of Nursing Students. Indian Journal of Public Health Research & Development, 9(12), 2098–2103.
Koskinen, K. U., & Vanharanta, H. (2002). The role of tacit knowledge in innovation processes of small technology companies. International Journal of Production Economics, 80(1), 57–64. https://doi.org/10.1016/s0925-5273(02)00243-8 Kuwashima, K. (2014). How to Use Models of Organizational Decision Making?
Annals of Business Administrative Science, 13(4), 215–230.
https://doi.org/10.7880/abas.13.215
Leake, B. D., Maguitman, A., Reichherzer, T., Canas, A. J. & Carvalho, M. (2003).
Aiding knowledge capture by searching for extensions of knowledge models.
in Proceedings of the 2nd International Conference on Knowledge Capture.
ACM Press, Sanibel Island, FL, USA, 23–25 October, pp. 44–53.
Li, W. (2018). Perspectives from Systemic Functional Linguistics. Social Semiotics, 29(5), 738–740. https://doi.org/10.1080/10350330.2018.1532665
Liew, A. (2013). DIKIW: Data, information, knowledge, intelligence, wisdom and their interrelationships. Business Management Dynamics, 2(10), 49
Liou, Y. (1992). Collaborative Knowledge Acquisition. Expert Systems with
Applications, 5, 1–13.
Madhusudhan, M., & Singh, V. (2016). Integrated library management systems. The Electronic Library, 34(2), 223–249. https://doi.org/10.1108/el-08-2014-0127 Maiden, N. A. M., & Rugg, G. (1996). ACRE: selecting methods for requirements
acquisition. Software Engineering Journal, 11(3), 183.
https://doi.org/10.1049/sej.1996.0024
Marshall, B., Cardon, P., Poddar, A., & Fontenot, R. (2013). Does Sample Size Matter in Qualitative Research?: A Review of Qualitative Interviews in is Research. Journal of Computer Information Systems, 54(1), 11–22.
https://doi.org/10.1080/08874417.2013.11645667
Martin, A. (2017). Impact of Tacit Knowledge Deficits in Acute Care Hospital Settings [Doctoral Dissertation]. Baker College.
Maté, A., & Trujillo, J. (2011). Incorporating Traceability in Conceptual Models for Data Warehouses by Using MDA. Conceptual Modeling – ER 2011, 459–
466. https://doi.org/10.1007/978-3-642-24606-7_36
Maxwell, J. (2017). The validity and reliability of research: A realist perspective. In D. Wyse, L. Suter, E. Smith, & N. Selwyn (Eds.), The BERA/SAGE handbook of educational research (Vol. 1, pp. 116–141). SAGE Publications.
McAdam, R., Mason, B., & McCrory, J. (2007). Exploring the dichotomies within the tacit knowledge literature: towards a process of tacit knowing in organizations. Journal of Knowledge Management, 11(2), 43–59.
https://doi.org/10.1108/13673270710738906
McGrath, L., Negretti, R., & Nicholls, K. (2019). Hidden expectations: scaffolding subject specialists’ genre knowledge of the assignments they set. Higher Education, 78(5), 835–853. https://doi.org/10.1007/s10734-019-00373-9 McVey, L., Lees, J., & Nolan, G. (2015). Reflective-verbal language and reverie in a
qualitative interview. Counselling and Psychotherapy Research, 16(2), 132–
140. https://doi.org/10.1002/capr.12059
Meyer, B., & Sugiyama, K. (2007). The concept of knowledge in KM: a dimensional model. Journal of Knowledge Management, 11(1), 17–35.
https://doi.org/10.1108/13673270710728213
Mohajan, H. K. (2016). Sharing of Tacit Knowledge in Organizations: A Review.
American Journal of Computer Science and Engineering, 3(2), 6-19.
Moolman, L. (2020). A cloud based business intelligence framework for a cellular Internet of Things network [Master Thesis]. North-West University.
Moscoso-Zea, O., Andres-Sampedro, & Lujan-Mora, S. (2016). Datawarehouse design for educational data mining. 2016 15th International Conference on Information Technology Based Higher Education and Training (ITHET).
Istanbul, Turkey: IEEE. https://doi.org/10.1109/ithet.2016.7760754
Moscoso-Zea, O., Castro, J., Paredes-Gualtor, J., & Lujan-Mora, S. (2019). A Hybrid Infrastructure of Enterprise Architecture and Business Intelligence &
Analytics for Knowledge Management in Education. IEEE Access, 7, 38778–
38788. https://doi.org/10.1109/ACCESS.2019.2906343
Moscoso-Zea, O., Luján-Mora, S., Cáceres, C. E., & Schweimanns, N. (2016).
Knowledge Management Framework using Enterprise Architecture and Business Intelligence. Proceedings of the 18th International Conference on Enterprise Information Systems, 244–249.
https://doi.org/10.5220/0005916002440249
Moynihan, T. (2002). Coping with IS/IT Risk Management: The Recipes of Experienced Project Managers. London: Springer Verlag.
Muñoz, C. A., Mosey, S., & Binks, M. (2015). The tacit mystery: reconciling different approaches to tacit knowledge. Knowledge Management Research
& Practice, 13(3), 289–298. https://doi.org/10.1057/kmrp.2013.50
Muntean, M. (2018). Business Intelligence Issues for Sustainability Projects.
Sustainability, 10(2), 335. https://doi.org/10.3390/su10020335
Mutanga, A. (2014). A Context-Based Business Intelligence Solution for South African Higher Education. Journal of Industrial and Intelligent Information, 3(2), 119–125. https://doi.org/10.12720/jiii.3.2.119-125
Myhill, D., Jones, S., & Lines, H. (2018). Supporting less proficient writers through linguistically aware teaching. Language and Education, 32(4), 333–349.
https://doi.org/10.1080/09500782.2018.1438468
Nam, D., & Park, K. (2015). Corpus-Based Analysis of Thematic Structure in L2 Writing. Multimedia-Assisted Language Learning, 18(4), 99–120.
Narayan, S., Sidhu, J. S., Baden-Fuller, C., & Volberda, H. W. (2020). Examining CEOs’ Business Model Schemas: A Cognitive Mapping of Differences Between Industry Insiders and Outsiders. In K. J. Sund (Ed.), New Horizons in Managerial and Organizational Cognition (pp. 15–37). Emerald Publishing Limited. https://doi.org/10.1108/S2397-521020200000004003 Narayana, S. (2020). Interpretable Question Answering using Deep Embedded
Knowledge Reasoning to Solve Qualitative Word Problems [Master Thesis].
Arizona State University.
Natek, S., & Lesjak, D. (2021). Knowledge management systems and tacit knowledge. International Journal of Innovation and Learning, 29(2), 166–
180.
Naumenko, L., & Оliynyk, О. (2018). The Cognitive Approach to Teaching Students English Terminological Lexis of the Subject Field of “Microeconomics.”
Psycholinguistics, 24(2), 236–253. https://doi.org/10.31470/2309-1797-2018- 24-2-236-253
Nelms, K. R. & Porter, A. R. (1985). EFTE: An interactive Delphi method.
Technological Forecasting and Social Change, 28, 43–61.
Nemati, H. R., Steiger, D. M., Lyer, L. S. & Herschel, R. T. (2002). Knowledge warehouse: An architectural integration of knowledge management, decision support, artificial intelligence and data warehousing. Decision Support Systems, 33(2), 143–161.
Neuhaus, P., Raj, A., &Clancey, W. J. (2015). Human-Centered Cognitive Orthoses:
Artificial Intelligence for, Rather than Instead of, the People. AI Magazine, 36(4), 9. https://doi.org/10.1609/aimag.v36i4.2612
Neve, T. O. (2003). Right Questions to Capture Knowledge. Electronic Journal of Knowledge Management, 1(1), 47–54.
Nevo, D. & Chan, Y. (2007). A Delphi study of knowledge management system:
Scope and requirements. Information & Management, 44(6), 583–597.
Nguyen P. V. (2011). Using Data Warehouse to Support Building Strategy or Forecast Business Tend. arXiv:1205.0724v1. Retrieved July 25, 2017, from https://arxiv.org/abs/1205.0724v1.
Nguyen, L., & Shanks, G. (2007). Using Protocol Analysis to Explore the Creative