Tacit knowledge for business intelligence framework using cognitive-based approach

158  Download (0)

Full text

(1)

The copyright © of this thesis belongs to its rightful author and/or other copyright owner. Copies can be accessed and downloaded for non-commercial or learning purposes without any charge and permission. The thesis cannot be reproduced or quoted as a whole without the permission from its rightful owner. No alteration or changes in format is allowed without permission from its rightful owner.

(2)

TACIT KNOWLEDGE FOR BUSINESS INTELLIGENCE FRAMEWORK USING COGNITIVE-BASED APPROACH

HERISON SURBAKTI

DOCTOR OF PHILOSOPHY UNIVERSITI UTARA MALAYSIA

2022

(3)
(4)

Permission to Use

In presenting this thesis in fulfillment of the requirements for a postgraduate degree from Universiti Utara Malaysia, I agree that the Universiti Library may make it freely available for inspection. I further agree that permission for the copying of this thesis in any manner, in whole or in part, for the scholarly purpose may be granted by my supervisor(s) or, in their absence, by the Dean of Awang Had Salleh Graduate School of Arts and Sciences. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and Universiti Utara Malaysia for any scholarly use which may be made of any material from my thesis.

Requests for permission to copy or to make other use of materials in this thesis, in whole or in part, should be addressed to:

Dean of Awang Had Salleh Graduate School of Arts and Sciences UUMCollege of Arts and Sciences

Universiti Utara Malaysia 06010 UUM Sintok

(5)

ABSTRAK

Pengetahuan tersirat menjadi isu utama dalam pendekatan kecerdasan perniagaan terhadap sistem pengetahuan. Bagi menangkap pengetahuan tersirat bukanlah tugas yang mudah. Ini kerana, melibatkan data di dalam bentuk yang tidak terstruktur dan juga pelbagai sumber maklumat yang tidak mudah untuk diakses melalui cara tradisional. Penyelidikan ini menerangkan pendekatan sistematik untuk menangkap pengetahuan tersirat dengan membuat Kerangka Kecerdasan Perniagaan yang menunjukkan pengetahuan tersirat dapat diakses melalui berbagai kaedah dan kriteria pemilihan. Pendekatan ini adalah berdasarkan teori Fungsi Linguistik Sistematik, yang dibangunkan menjadi protokol temu ramah untuk pemilik pengetahuan. Data diubah menjadi peta kognitif untuk dibekalkan kepada Gudang Data. Kerangka ini diuji oleh 23 orang pustakawan dari perpustakaan di universiti Jawa Barat dan Yogyakarta, Indonesia. Algoritma dimulakan dengan temu ramah yang dikendalikan bagi mengenal pasti senarai masalah yang dihadapi oleh para pustakawan. Masalah-masalah tersebut kemudian diubah menjadi soalan soal selidik untuk mengenal pasti kualiti masalah seperti kekerapan, mendesak, keparahan, dan kepentingan. Seterusnya, dari hasil soal selidik, pemilik pengetahuan tersirat yang terbaik dikenal pasti. Mereka merupakan responden yang dapat menyelesaikan masalah yang tidak dapat diselesaikan oleh majoriti responden. Pemilik pengetahuan yang terbaik menjalani temu ramah mengikut tatabahasa untuk mengumpulkan penyelesaian yang mereka menggunakan untuk masalah tersebut. Transkripsi hasil temu ramah diubah menjadi peta kognitif yang memvisualisasikan penyelesaiannya.

Peta kognitif ini disimpan di Gudang Data untuk siap dikumpulkan pada bila-bila masa untuk tujuan analisis. Kerangka ini disahkan melalui perisian Power BI dan diulas oleh tujuh pakar domain. Hasil pengesahan ini menunjukan Power BI boleh memaparkan kepentingan fenomena dan membuat hubungan dengan tahap penyelesaian yang disediakan oleh amalan pustakawan. Kebolehgunaan ke domain lain dibenarkan selagi domain tersebut mengalami masalah yang berkaitan dengan teknikal, pengurusan, dan empirik yang sering dihadapi oleh pekerja. Penyelidikan ini menyumbang kepada kaedah menangkap pengetahuan tersirat dengan menggunakan pendekatan berasaskan kognitif untuk memastikan kelangsungan perniagaan dalam pelbagai domain.

Kata kunci: Kecerdasan Perniagaan, Pengurusan Pengetahuan, Pendekatan Berasaskan Kognitif, Fungsi Linguistik Sistematik, Pengetahuan Tersirat.

(6)

ABSTRACT

Tacit knowledge becoming a key issue in business intelligence approach to knowledge systems. Capturing the tacit knowledge is not a straightforward task, since it consists of unstructured data and related to a variety of information that is not always accessible through traditional means. This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. The data transformed into cognitive maps to supply the data warehouse. The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. The problems were then converted into a questionnaire to identify qualities of the problems such as frequency, urgency, severity, and importance. From the questionnaire results, the best tacit knowledge performers were identified. They are respondents who can solve the problems, while the majority of the respondents are unable to solve them. The best performers were then subjected to grammar targeted interview to collect the solutions they made to the problems. The transcription of the interview results is then converted into cognitive maps that visualize the solutions. These cognitive maps are then stored in a data warehouse and ready to collect anytime for analytics purposes. The framework is validated through Power BI and reviewed by seven experts. Its applicability to other domains is justified as long as the domain, e.g., manufacturing, have experienced problems related to technical, managerial, and empirical problems faced by employees at work. This research contributes to the methods of capturing tacit knowledge using a cognitive-based approach, which important to ensure the continuity of business in various domains.

Keywords: Business Intelligence, Knowledge Management, Cognitive-based Approach, Systemic Functional Linguistics, Tacit Knowledge.

(7)

ACKNOWLEDGEMENT

Firstly, I would like to express my sincere gratitude to my supervisor, Prof. Madya Ts. Dr. Azman B Ta'a for the continuous support of my Ph.D. study and related research, for his patience, motivation, and immense knowledge. His guidance helped me in all the time of research and writing of this thesis. I could not have imagined having a better supervisor and mentor for my Ph.D. study.

A special thanks to my wife and my son. Words cannot express how grateful I am to my family for all the sacrifices they’ve made on my behalf. Their prayer for me was what sustained me thus far. In the end, I would like to express appreciation to my beloved siblings, dad, mom, and my parents-in-law, who has supported me along the way.

My sincere thanks also go to my fellow doctoral students for their feedback, cooperation, and friendship. All my friends provided me an opportunity to share my research struggle and stimulate discussions. Without their precious support, it would not be possible to conduct this research.

(8)

TABLE OF CONTENTS

Permission to Use ... i

ABSTRAK ... ii

ABSTRACT ... iii

ACKNOWLEDGEMENT ... iv

TABLE OF CONTENTS ... v

List of Tables ... x

List of Figures ... xii

List of Appendices ... xvi

List of Abbreviations ... xvii

CHAPTER ONE INTRODUCTION ... 1

1.1 Background ... 1

1.2 The motivation of the Study ... 3

1.3 Problem Statement ... 6

1.4 Research Questions ... 10

1.5 Research Objectives ... 11

1.6 Research Gap ... 11

1.7 Research Strategy ... 13

1.7.1 Phase I – Defining the Capturing Issues in BI ... 13

1.7.2 Phase II – Develop Cognitive-Approach Method for Capturing Tacit Knowledge ... 15

1.7.3 Phase III – Evaluate the Cognitive Based Approach in BI ... 16

1.8 Contribution of the Study ... 16

1.8.1 Theoretical Contribution ... 17

1.8.2 Practical Contribution ... 18

1.9 Thesis Organization ... 19

CHAPTER TWO LITERATURE REVIEW ... 23

2.1 Introduction ... 23

2.2 Knowledge Management in Academic Libraries ... 25

2.3 Managing the Knowledge ... 28

2.4 Types of Knowledge ... 31

(9)

2.5 Capturing Tacit Knowledge ... 35

2.5.1 Capturing Tacit Knowledge Techniques ... 36

2.6 Intelligence in Information Technology... 44

2.6.1 Business Intelligence (BI) ... 45

2.6.2 Business Intelligence Framework ... 46

2.7 Data Sources... 51

2.8 Extraction, Transformation, Load (ETL) ... 52

2.9 Data Warehouse (DW) ... 54

2.10 Data Analysis in Business Intelligence ... 56

2.10.1 Type of Data Analysis ... 56

2.11 Tools Used in the Research ... 59

CHAPTER THREE COGNITIVE-BASED APPROACH FOR BUSINESS INTELLIGENCE FRAMEWORK ... 62

3.1 Introduction ... 62

3.2 Cognitive Approach ... 65

3.2.1 Cognitive Mapping ... 66

3.2.2 Cognitive Analytics ... 74

3.2.3 Cognitive Model ... 75

3.3 Theoretical Framework ... 76

3.3.1 Knowledge, Information, Data Model ... 79

3.4 Linguistic Source of Tacit ... 85

3.4.1 Phonological and Non-Verbal Source of Tacit ... 92

3.5 Contextual Resources ... 94

3.6 Systematic Literature Review ... 95

3.7 Conclusion ... 96

CHAPTER FOUR RESEARCH METHODOLOGY ... 98

4.1 Introduction ... 98

4.2 Research Methodology... 99

4.3 Research Methodology Summary ... 101

4.4 Design for Capturing Tacit Knowledge ... 104

4.5 Research Design ... 118

(10)

4.6 Conclusion ... 130

CHAPTER FIVE IMPLEMENTATION OF COGNITIVE-BASED APPROACH FOR BUSINESS INTELLIGENCE (COBASE-BI): CASE STUDY IN LIBRARY OF HIGHER EDUCATION ... 131

5.1 Introduction ... 131

5.2 Respondent Survey ... 133

5.3 Interview Result ... 134

5.4 Questionnaire Design ... 136

5.5 Questionnaire Data Acquisition ... 144

5.5.1 Problem Faced by Librarians (Q1 and Q2) ... 145

5.5.2 Inter librarian relationship (Q3 and Q4) ... 152

5.5.3 Librarian and Patrons Relationship (Q5 and Q6) ... 156

5.5.4 Emergency events (Q7 and Q8) ... 161

5.5.5 External Relations (Q9 and Q10) ... 167

5.5.6 Library service (Q11 and Q12) ... 170

5.6 Questionnaire Result ... 177

5.7 Second Interview ... 181

5.8 Second Interview Result ... 189

5.9 Cognitive-based Analysis... 190

5.9.1 Visitors do not know what they are searching for (PD6) ... 190

5.9.2 Fuss Among Visitors that not relevant with the library (PD8) ... 191

5.9.3 Less budget (PD9) ... 193

5.9.4 Limited collection for new books (PD10)... 194

5.9.5 Fewer Visitors (PD11) ... 196

5.9.6 Interruptions at work(PD16) ... 196

5.9.7 Social relations between staff are not good (PD20) ... 197

5.9.8 Staff also teaches (PD22) ... 198

5.9.9 Lazy Staff (PD24) ... 199

5.9.10 Providing information needed by visitors (SD1) ... 200

5.9.11 Literacy programs for students (SD2) ... 201

5.9.12 Computer courses for research (SD3) ... 202

(11)

5.9.13 Conservation of books (SD4) ... 203

5.9.14 Making information guide (SD8) ... 204

5.9.15 Development of collections (SD9) ... 205

5.9.16 Information Technology Course (SD14) ... 207

5.9.17 Creating Living and Crowd Library (SD15) ... 208

5.9.18 Data management (SD16) ... 209

5.9.19 Activities that create knowledge (SD17) ... 211

5.10 Lesson Learned ... 212

5.11 Cognitive-based Approach and Business Intelligence ... 213

5.12 Conclusion ... 224

CHAPTER SIX VALIDATION AND EVALUATION ... 226

6.1 Introduction ... 226

6.2 Data Collection for the Case Study ... 227

6.3 Data Modelling for Library Data Warehouse ... 229

6.4 Business Intelligence Descriptive Analysis ... 232

6.4.1 Problems Librarians face ... 232

6.4.2 Relationship between Librarians ... 236

6.4.3 Relationship between librarians and patrons ... 240

6.4.4 Emergency Situations in the library ... 242

6.4.5 External activities are undertaken by librarians ... 246

6.4.6 Providing services for librarians in the future ... 248

6.5 Cognitive Mapping for Business Intelligence ... 250

6.6 Cognitive Map ... 265

6.7 Business Intelligence and Predictive Analysis ... 269

6.8 Experts Review ... 275

6.8.1 The setting of The Questionnaires ... 275

6.8.2 Expert Review Results ... 277

6.8.3 Analysis of Comments ... 281

6.8.3.1 Compliments about the research... 282

6.8.3.2 Enhancement ... 284

6.9 Summary and General Findings ... 287

(12)

6.10 Conclusion ... 289

CHAPTER SEVEN CONCLUSION AND RECOMMENDATION ... 291

7.1 Research Objectives Examination... 291

7.2 Method to Capture Tacit Knowledge ... 292

7.3 Construction of a Capturing and Codifying Tacit Knowledge Framework for Managing Tacit Knowledge ... 293

7.4 Evaluation of the Capturing and Codifying Tacit Knowledge Framework ... 295

7.5 Research Contribution ... 295

7.5.1 Review of the Current Status of HEI Libraries in Indonesia ... 296

7.5.2 Design of a Framework that Capture Tacit Knowledge for BI Purposes 296 7.5.3 Application of Capturing Tacit Knowledge in BI Field ... 297

7.6 Research Limitations ... 299

7.6.1 The Use of Librarians as Research Sample ... 299

7.6.2 The Use of Interview as the Tool to Capture Tacit Knowledge ... 299

7.7 Further Research ... 300

7.7.1 Consolidation Method ... 301

7.7.2 Further Exploration of the Framework ... 301

7.7.3 The Impact of Tacit Knowledge for Enterprise and Decision Making Process ... 301

7.7.4 Real Data from Other Disciplines ... 302

REFERENCES ... 303

(13)

List of Tables

Table 2.1: Summary of techniques for capturing and converting tacit knowledge

(Pourzolfaghar, Ibrahim, Abdullah, & Adam, 2014) ... 38

Table 3.1: Summary of traditions in linguistics and its relations to capturing tacit knowledge ... 87

Table 4.1: Summary of Research Methodology ... 102

Table 4.2: Previous Research ... 107

Table 5.1: Research Sample ... 133

Table 5.2: First Stage Interview Results and Basic Materials for the Questionnaire ... 137

Table 5.3: Problems frequency that faced by librarians ... 145

Table 5.4: Difficulty level problems faced by librarians ... 147

Table 5.5: Matrix Combination of Frequency and Difficulty of Problems ... 148

Table 5.6: Urgency Value of each problem ... 149

Table 5.7: Detailed Respondents' Answers for Every Urgent Problem ... 151

Table 5.8: Frequency of Relations between Librarians ... 153

Table 5.9: Importance of Activities among Librarians ... 133

Table 5.10: Matrix of Combination of Frequency and Interest of Activities ... 155

Table 5.11: Urgency Value of each activity ... 156

Table 5.12: Frequency of Relationships between Librarians and Patrons ... 157

Table 5.13: Importance of Relationship between Librarians and Patrons ... 158

Table 5.14: Matrix of Combination of Frequency and Interests of Activities ... 159

Table 5.15: Urgency Value of each activity ... 160

Table 5.16: Frequency of Emergency Events in the Library ... 161

Table 5.17: Level of Readiness in Dealing with Emergency Situations ... 163

Table 5.18: Matrix of Combination of Frequency and Event Readiness ... 164

Table 5.19: Urgency Value of Each Problem ... 165

Table 5.20: Frequency of External Activities Undertaken by Librarians ... 167

Table 5.21: Importance of Librarian external activities ... 168

Table 5.22: Matrix of Combination of Frequency and Difficulty of Problems ... 169

Table 5.23: Value of the Urgency of Each Problem ... 170

Table 5.24: Degree of Interest Problems Faced by Librarians ... 170

Table 5.25: Difficulty Levels Problems Faced by Librarians ... 172

Table 5.26: Matrix of Combination of Interest and Problem Difficulty ... 173

(14)

Table 5.27: Urgency Value of each service ... 174

Table 5.28: Detailed Respondents' Answers for Each Urgent Problem ... 176

Table 5.29: Questionnaires Result ... 177

Table 5.30 Samples for Second Interview ... 182

Table 6.1: Problems faced by librarians ... 233

Table 6.2: Relationship between librarians ... 237

Table 6.3: Relationship between librarians and patrons ... 240

Table 6.4: Emergencies in the library ... 243

Table 6.5: External activities undertaken by librarians ... 246

Table 6.6: Provision of services for libraries in the future ... 249

Table 6.7: The number and percentage of experts and answers who supported (“Yes”), opposed (“No), and were “Neutral” to the questions on the capabilities of the methodology ... 277

Table 6.8: Themes and Frequencies of Qualitative Comments as Shared by Experts ... 284

(15)

List of Figures

Figure 1.1: Proposed Framework: Data Management Using Cognitive Approach ... 12

Figure 1.2: Research Strategy ... 14

Figure 2.1: Differentiation among Explicit, Implicit, and Tacit Knowledge (Nickols,2013) 31 Figure 2.2: Relationship among Data, Information, Knowledge, and Wisdom (Bellinger, 2004) ... 34

Figure 2.3: Inputs and Outputs of Business Intelligence (Nguyen, 2011) ... 45

Figure 2.4: Gartner BI Framework (February, 2019) ... 50

Figure 2.5: The Multi-Layer BI Framework (February, 2019) ... 49

Figure 2.6: Business Intelligence Architecture ... 61

Figure 2.7: ETL processes (Xu & Yu-Shi, 2016) ... 54

Figure 2.8: Magic Quadrant for Analytics and Business Intelligence Platforms (Gartner, 2020) ... 61

Figure 3.1: Systemic Functional Linguistics (SFL) System (Nam & Park, 2015)... 65

Figure 3.2: Managing the Knowledge Model (Egbu, Hari, & Renukappa, 2005; Hernandez- Matias, Vizan, Perez-Garcia, & Rios, 2008) ... 67

Figure 3.3: Semantic map for different types of transportation (Esfahanipour & Montazemi, 2015) ... 70

Figure 3.4: Example of a causal map (Pillutla & Giabbanelli, 2019) ... 70

Figure 3.5: Concept map for plants (Esfahanipour & Montazemi, 2015)... 71

Figure 3.6: A cognitive model of the memory system (Sato & Huang, 2015a)... 80

Figure 3.7: The proposed generic KID Model (Sato & Huang, 2015b) ... 81

Figure 3.8: KID Model (Sato & Huang, 2015b) ... 82

Figure 3.9: Research Data Collection Scheme ... 84

Figure 3.10: Flow of Capturing Tacit Knowledge for Business Intelligence ... 95

Figure 3.11: Cognitive-based Approach for Business Intelligence (Cobase-BI) framework 95 Figure 4.1: Design for Capturing Tacit Knowledge... 112

Figure 4.2 General flow of information to collect problem-focused tacit data ... 114

Figure 4.3: Comprehensive tacit data collection ... 116

Figure 4.4: Simple Diagram for Tacit Knowledge Capturing ... 118

Figure 4.5 Scope of tacit knowledge ... 119

Figure 4.6: Research Design ... 120

Figure 5.1: PD6 Cognitive Map based on two respondents’ Tacit Knowledge ... 190

(16)

Figure 5.2: PD8 Cognitive Map based on two respondents’ Tacit Knowledge ... 192

Figure 5.3: PD9 Cognitive Map based on one of respondent's Tacit Knowledge ... 194

Figure 5.4: PD10 Cognitive Map based on three respondents’ Tacit Knowledge ... 195

Figure 5.5: PD11 Cognitive Map based on three respondents’ Tacit Knowledge ... 196

Figure 5.6: PD16 Cognitive Map based on one respondent's Tacit Knowledge ... 197

Figure 5.7: PD20 Cognitive Map based on one of respondent's Tacit Knowledge ... 198

Figure 5.8 PD22: Cognitive Map based on one of respondent's Tacit Knowledge ... 199

Figure 5.9: PD24 Cognitive Map based on one of respondent's Tacit Knowledge ... 200

Figure 5.10: SD1 Cognitive Map based on one of respondent's Tacit Knowledge ... 200

Figure 5.11: SD2 Cognitive Map based on one of respondent's Tacit Knowledge ... 201

Figure 5.12: SD3 Cognitive Map based on one of respondent's Tacit Knowledge ... 202

Figure 5.13: SD4 Cognitive Map based on three respondents’ Tacit Knowledge ... 203

Figure 5.14: SD8 Cognitive Map based on four respondents’ Tacit Knowledge ... 205

Figure 5.15: SD9 Cognitive Map based on three respondents’ Tacit Knowledge ... 206

Figure 5.16: SD14 Cognitive Map based on one of respondent's Tacit Knowledge ... 207

Figure 5.17: SD15 Cognitive Map based on one of respondent's Tacit Knowledge ... 208

Figure 5.18: SD16 Cognitive Map based on two respondents’ Tacit Knowledge ... 209

Figure 5.19: Visual Management Example ... 210

Figure 5.20: SD17 Cognitive Map based on three respondents’ Tacit Knowledge ... 211

Figure 5.21: Enhanced BI Framework comprising of tacit knowledge as the final output the research ... 216

Figure 5.22: Steps in capturing tacit knowledge ... 227

Figure 5.23: Tools for capturing tacit knowledge ... 219

Figure 5.24: Cognitive Map algorithm flowchart ... 223

Figure 6.1: Institutions of the Librarians ... 227

Figure 6.2: Potential Number of Patrons of the Librarians ... 228

Figure 6.3: Problem Difficulties Data Warehouse Design... 231

Figure 6.4: Frequency of problems librarians face ... 234

Figure 6.5: Ease of resolving problems librarians face ... 235

Figure 6.6: Difficulty in resolving problems librarians face ... 236

Figure 6.7: Importance of the phenomenon that requires knowledge transfer among librarians ... 238

Figure 6.8: Difficulty of resolving phenomenon that requires knowledge transfer among librarians ... 239

(17)

Figure 6.9: Frequency of phenomenon that required knowledge communication between

librarians and readers ... 241

Figure 6.10: Importance of the phenomenon that required knowledge communication between librarians and readers ... 242

Figure 6.11: Frequency of events or phenomenon classified as an emergency in the library ... 244

Figure 6.12 level of preparation to manage emergency events or phenomenon in the library (A) ... 245

Figure 6.13: Level of preparation to manage emergency events or phenomenon in the library (B) ... 246

Figure 6.14: Frequency of the phenomenon required coordination between librarians and the surrounding environment, organizations, or other libraries ... 247

Figure 6.15: Importance of the phenomenon that required coordination between librarians and surrounding environment, organizations, or other libraries ... 248

Figure 6.16: Ease of providing new services for libraries in the future ... 249

Figure 6.17: Difficulty in providing new services for libraries in the future ... 250

Figure 6.18: Visitors did not know what they were searching for ... 253

Figure 6.19: Fuss among visitors that are not relevant to the library ... 254

Figure 6.20: Frequency of not good social relationship between staff and Less Budget ... 255

Figure 6.21: Difficulty of not good social relationship between staff and Less Budget ... 256

Figure 6.22: Frequency of interruption at work and limited collection for new books ... 257

Figure 6.23: Difficulty in resolving interruption at work and limited collection for new books ... 257

Figure 6.24: Frequency of staff also teaches, and social relations between staff were not good ... 258

Figure 6.25: Difficulty of resolving staff also teaches, and social relations between staff were not good ... 259

Figure 6.26: Frequency of lazy staff ... 260

Figure 6.27: Difficulty in resolving lazy staff ... 260

Figure 6.28: Frequency of providing the information needed by visitors, literacy programs for students, and computer courses for research ... 261

Figure 6.29: Difficulty in resolving to provide the information needed by visitors, literacy programs for students, and computer courses for research ... 262

Figure 6.30: Frequency of making information guide, development of collections, conservation of books ... 263

(18)

Figure 6.31: Difficulty of resolving making information guide, development of collections,

conservation of books ... 263

Figure 6.32: Frequency of occurrence of information technology course, data management and creating living and crowd library ... 264

Figure 6.33: Difficulty of resolving information technology course, data management, and creating living and crowd library ... 265

Figure 6.34: Cognitive mapping showing lazy staffs in library ... 266

Figure 6.35: Cognitive mapping showing percentage of librarians involved ... 267

Figure 6.36: Cognitive mapping showing patrons did not know what they were searching for ... 268

Figure 6.37: Cognitive mapping showing patrons did not know what they were searching for ... 269

Figure 6.38: Prediction for Fuss among Visitors that were not relevant to the library ... 271

Figure 6.39: Lazy Staff ... 272

Figure 6.40: Visitors did not know what they were searching for ... 273

Figure 6.41: Computer courses for research ... 273

Figure 6.42: Conservation of books ... 274

Figure 6.43: Providing information needed by visitors ... 275

Figure 6.44: Answers Based on KM Experience of the Experts ... 278

Figure 6.45: Answers Based on BI Experience of the Experts ... 279

Figure 6.46: The Most and Least Answered “Yes” Questions Answers ... 280

Figure 6.47: All Expert Reviews Feedbacks (N = 7) ... 281

(19)

List of Appendices

Appendix A

Appendix A.1 First Interview Guide ... 331

Appendix A.2 Consent Form ... 337

Appendix A.3 Questionnaire ... 346

Appendix A.4 Questionnaire Datasheet ... 360

Appendix B Data Warehouse Model Appendix B.1 Problem Difficulty & Frequency Data Warehouse Model ... 368

Appendix B.2 Peer Communication Importance& Frequency Data Warehouse Model…..369

Appendix B.3 Patron Communication Importance& Frequency Data Warehouse Model...370

Appendix B.4 Emergency Preparedness& Frequency Data Warehouse Model...371

Appendix B.5 Environment Relation Importance& Frequency Data Warehouse Model...372

Appendix B.6 Service ImportanceDifficulty & Frequency Data Warehouse Model...373

Appendix C Business Intelligence Descriptive Dashboards ... 374

Appendix D Business Intelligence Cognitive Mapping Dashboards ... 382

Appendix E Business Intelligence Service Difficulty Likelihood Analysis ... 401

Appendix F Business Intelligence Problem Difficulty Likelihood Analysis ... 410

Appendix G Questionnaire for Experts Review ... 418

(20)

List of Abbreviations

Acronym Meaning

AI Artificial Intelligence AKPAR Akademi Pariwisata

AMIK Akademi Manajemen Informatika dan Komputer BI Business Intelligence

CCTV Closed-Circuit Television CM Cognitive Map

CTI Content Targeted Interview CTK Comprehensive Tacit Knowledge CTQ Content Targeted Questioning DBA Database Administrators DM Data Mining

DSS Decision Support System DW Data Warehouse

EF Emergency Frequency EP Emergency Preparedness

ERF Environmental Relations Frequency ERI Environmental Relations Importance ETL Extract, Transform, and Load

FDIII Fakultas Diploma III

FE FakutlasEkonomi

FKIP FakutlasIlmu Pendidikan GTI Grammar Targeted Interview GTQ Grammar Targeted Questioning HEI Higher Education Institutions IS Information System

IT Information Technology

KB Knowledge Bank

KID Knowledge, Information, and Data

(21)

KM Knowledge Management

KMS Knowledge Management System LCM Linguistic Categorization Model MFA Most Frequent Answer

NCF Patron Communication Frequency NCI Patron Communication Importance OLAP Online Analytical Processing OLTP Online Transaction Processing PCI (a) Peer Cognitive Interviews

PCI (b) Peer Communication Importance PCF Peer Communication Frequency PD Problem Difficulty

PF Problem Frequency PO Participant Observation

RDBMS Repository Data Base Management Systems SD Service Difficulty

SECI Socialization, Externalization, Combination, and Internalization SFL Systemic Functional Linguistics

SI Service Importance

SLR Systematic Literature Review SOP Standard Operating Procedures STAI Sekolah Tinggi Agama Islam STH Sekolah Tinggi Hukum STIE Sekolah Tinggi IlmuEkonomi STIKES Sekolah Tinggi Ilmu Kesehatan

STKIP Sekolah Tinggi Keguruan dan Ilmu Pendidikan

STMIK Sekolah Tinggi ManajemenInformatika dan Komputer STQ Semantic Targeted Questioning

UNIV Universitas

(22)

CHAPTER ONE INTRODUCTION

This chapter presents the background, problem statement, and motivation of this research. The chapter defines the research problems, the research gaps, and the research questions and objectives. Then, the research strategy is discussed in three phases, followed by the scope and the research contributions. This chapter ends with an overview of the thesis organization and a summary of the thesis.

1.1 Background

Business intelligence (BI) is a crucial part of the knowledge system in business operations. BI becomes an essential aspect of an organization that produces knowledge for decision purposes. The knowledge production comes from various tasks of analysis that required well-defined structured data. However, there has been a problem in the integration of the new types of data with internal transactional data such as motion data and uncaptured data, which consist of various types of structured and unstructured data (Raghupathi & Raghupathi, 2014). The evolution in business is mandatory to match the pace of global requirements. However, using technology as a solution to enhance the business is a significant challenge considering that every organization has individual and organizational knowledge either in the form of raw data or in the form of information. However, BI has the most significant function of data analysis for transforming the raw data into knowledge. Dearth research had been conducted to explore the use of knowledge and manage it as a new raw data to manage within BI and its applicability within various application domains.

(23)

REFERENCES

Abdullah, M. S. (2002). Knowledge modelling techniques for developing knowledge management systems. Third European Conference on Knowledge Managemnt: Trinity College Dublin, Ireland, 24-25 September 2002, (p. 17).

Abernethy, M. A., Horne, M., Lillis, A. M., Malina, M. A., & Selto, F. H. (2005). A multi-method approach to building causal performance maps from expert knowledge. Management Accounting Research, 16(2), 135–155.

https://doi.org/10.1016/j.mar.2005.03.003.

Addis, M. (2016). Tacit and explicit knowledge in construction management.

Construction Management and Economics, 34(7–8), 439–445.

https://doi.org/10.1080/01446193.2016.1180416

Afolayan, O. T. (2020). A Framework for Action to Improve Tacit Knowledge Sharing in Nigeria’s Higher Education Institutions. Journal of Information Science, 12.

Al Rashdi, S. S., & Nair, S. S. K. (2017). A business intelligence framework for Sultan Qaboos University: A case study in the Middle East. Journal of Intelligence Studies in Business, 7(3). https://doi.org/10.37380/jisib.v7i3.278 Almurashi, A. W. (2016). An Introduction to Halliday’s Systemic Functional

Linguistics. Journal for the Study of English Linguistics, 4(1), 70–81.

https://doi.org/10.5296/jsel.v4i1.9423

Alonderiene, R. A. (2006). Tacit knowledge acquisition and transfer in the process of informal learning. Problems and perspectives in management , 4 (3), 134- 145.

Andersen, D. F., & Richardson, G. P. (1997). Scripts for group model building.

System Dynamics Review, 13(2), 107–129. https://doi.org/10.1002/(sici)1099- 1727(199722)13:2<107::aid-sdr120>3.0.co;2-7.

Ansari, F., Glawar, R., & Nemeth, T. (2019). PriMa: A prescriptive maintenance model for cyber-physical production systems. International Journal of Computer Integrated Manufacturing, 32(4–5), 482–503.

https://doi.org/10.1080/0951192X.2019.1571236

Avdimiotis, S. (2019). Emotional intelligence and tacit knowledge management in hospitality. Journal of Tourism, Heritage & Services Marketing, 5(2), 3–10.

(24)

https://doi.org/10.5281/ZENODO.3601651

Awad, E. M. & Ghaziri, HM. (2007). Knowledge Management. Upper Saddle River:

Pearson Education Inc.

Aziz, R. F., & Hafez, S. M. (2013). Applying lean thinking in construction and performance improvement. Alexandria Engineering Journal, 52(4), 679–695.

https://doi.org/10.1016/j.aej.2013.04.008

Bakar, M. S. A. & Ta’a, A. (2014). Business Intelligence Modelling for Graduate Enterpreneur Programme. Journal of Information and Communication Technology (JICT), 13(1), 55–86

Balasubramanian, P. K. N., Henderson, J. C. & Kwan, M. M. (1999). Managing process knowledge for decision support. Decision Support Systems, 27(1–2), 145–162.

Batra, D. (2018). Agile values or plan-driven aspects: Which factor contributes more toward the success of data warehousing, business intelligence, and analytics project development? Journal of Systems and Software, 146, 249–262.

https://doi.org/10.1016/j.jss.2018.09.081

Bear, A., & Knobe, J. (2017). Normality: Part descriptive, part prescriptive.

Cognition, 167, 25–37. https://doi.org/10.1016/j.cognition.2016.10.024

Becerra-Fernandez, I., Gonzalez, A. J. and Sabherval, R. (2004). Knowledge Management. Prentice Hall, Upper Saddle River.

Bedi, S., & Walde, C. (2017). Transforming Roles: Canadian Academic Librarians Embedded in Faculty Research Projects. College & Research Libraries, 78(3), 314. https://doi.org/10.5860/crl.78.3.314

Bellinger, G., Castro, D., & Mills, A. (2004). Data, information, knowledge, and wisdom. 47

Bidin, M. A. F., & Yunus, A. M. (2018). Business Intelligence Using Data Mining for Organizational Sustainability: A Case Study of Digi Telecommunication Sdn Bhd. International Journal of Academic Research in Business and Social Sciences, 7(12), Pages 471-485. https://doi.org/10.6007/IJARBSS/v7- i12/3628

Boileau, N., & Herbst, P. (2011). How Teachers Evaluate Breaches of Norms in High School Geometry. In NCTM.

(25)

Bolloju, N. M. K. & Turban, E. (2002). Integrating knowledge management into eterprise environments for the next generation decision support. Decision Support Systems, 33(2), 163–176.

Boose, J. H. (1989). A survey of knowledge acquisition techniques and tools.

Knowledge Acquisition, 1, 3–37.

Bowman, G., MacKay, R. B., Masrani, S., & McKiernan, P. (2013). Storytelling and the scenario process: Understanding success and failure. Technological Forecasting and Social Change, 80(4), 735–748.

https://doi.org/10.1016/j.techfore.2012.04.009

Bradshaw, J. M., Ford, K. M. Adams-Webber, J. R. & Boose, J. H. (1993). Beyond the repertory grid: New approaches to constructivist knowledge acquisition tool development. International Journal of Intelligent Systems, 8(2), 287–

333.

Branin, J. (2003). Knowledge Management in Academic Libraries : Building the Knowledge Bank at the Ohio State University. Journal of Library Administration, 39(4), 41–56.

Bratianu, C. (2019). Exploring Managerial Decision Making through the Lens of Knowledge Dynamics. Strategica: Upscaling Digital Transformation in Business and Economics, 427–433.

Brewer, P. D., & Brewer, K. L. (2010). Knowledge Management, Human Resource Management, and Higher Education: A Theoretical Model. Journal of Education for Business, 85(6), 330–335.

https://doi.org/10.1080/08832321003604938

Burgess, D. (2005). What Motivates Employees to Transfer Knowledge Outside Their Work Unit? Journal of Business Communication, 42(4), 324–348.

https://doi.org/10.1177/0021943605279485

Burnette, M. (2017). Tacit knowledge sharing among library colleagues: a pilot study. Reference Services Review, 45(3), 382–397.

https://doi.org/10.1108/rsr-11-2016-0082

Busch, P. (2006). Organization design and tacit knowledge transferal: An examination of three IT firms. Journal of Knowledge Management Practice, 7(2). Retrieved from http://www.tlainc.com/jkmp.htm

(26)

Bustamante, A., Sebastia, L., & Onaindia, E. (2019). Can Tourist Attractions Boost Other Activities Around? A Data Analysis through Social Networks. Sensors, 19(11), 2612. https://doi.org/10.3390/s19112612

Campbell, H. M. (2010). The liberation of intellectual capital through the natural evolution of knowledge management systems. 2010 2nd IEEE International Conference on Information Management and Engineering. Chengdu, China:

IEEE. https://doi.org/10.1109/icime.2010.5478008

Carson, M. C., Harrington, M. E., Thompson, N., O'Connor, J. J. & Theologis, T. N.

(2001). Kinematic analysis of a multi-segment foot model for research and clinical applications: A repeatability analysis. Journal of Biomechanics, 34(10), 1299–1307.

Chandiok, A., & Chaturvedi, D. K. (2016). Cognitive Decision Support System for medical diagnosis. 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).

New Delhi, India: IEEE. https://doi.org/10.1109/icctict.2016.7514604

Chandiok, A., & Chaturvedi, D. K. (2016). Cognitive Decision Support System for medical diagnosis. 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 337–342. https://doi.org/10.1109/ICCTICT.2016.7514604

Chatti, M. A., Schroeder, U., & Jarke, M. (2012). LaaN: Convergence of Knowledge Management and Technology-Enhanced Learning. IEEE Transactions on Learning Technologies, 5(2), 177–189. https://doi.org/10.1109/tlt.2011.33.

Chaudhuri, S., Dayal, U., &Narasayya, V. (2011). An overview of business intelligence technology. Communications of the ACM, 54(8), 88–98.

https://doi.org/10.1145/1978542.1978562

Chen, Chiang, &Storey. (2012b). Business Intelligence and Analytics: From Big Data to Big Impact. MIS Quarterly, 36(4), 1165.

https://doi.org/10.2307/41703503

Chen, H. (1992). Knowledge-based document retrieval framework and design.

Journal of Information Sciecnce, 18(4), 293–314.

Chen, R., Blomqvist, H., Koch, S., & Skyttberg, N. (2017). Exploring Vital Sign Data Quality in Electronic Health Records with Focus on Emergency Care

(27)

Warning Scores. Applied Clinical Informatics, 08(03), 880–892.

https://doi.org/10.4338/aci-2017-05-ra-0075

Cheng, C., Zhong, H., & Cao, L. (2020). Facilitating speed of internationalization:

The roles of business intelligence and organizational agility. Journal of

Business Research, 110, 95–103.

https://doi.org/10.1016/j.jbusres.2020.01.003

Cheng, C.-Y., Ou, T.-Y., Chen, T.-L., & Chen, Y.-Y. (2014). Transferring cognitive apprenticeship to manufacturing process knowledge management system.

VINE, 44(3), 420–444. https://doi.org/10.1108/vine-03-2013-0011.

Cheng, L., & Cheng, P. (2011). Integration: Knowledge Management and Business Intelligence. 2011 Fourth International Conference on Business Intelligence and Financial Engineering. Wuhan, China: IEEE.

https://doi.org/10.1109/bife.2011.172

Chu, H. C. & Hwang, G. (2008). A Delphi-based approach to developing study of knowledge management system with the cooperation of multiple experts.

Expert Systems with Applications, 34(4), 2826–2840.

Chu, H. C.& Hwang, G. (2006). A Delphi-based approach to developing expert systems with the cooperation of multiple experts. Expert Systems with Applications, 34(4), 2826–2840. https://doi.org/10.1016/j.eswa.2007.05.034 Chugh, R. (2017). Barriers and Enablers of Tacit Knowledge Transfer in Australian

Higher Education Institutions. International Journal of Education and Learning Systems, 2, 272–276.

Clarke, T., & Rollo, C. (2001). Corporate initiatives in knowledge management.

Education + Training, 43(4/5), 206–214.

https://doi.org/10.1108/00400910110399201

Colicchia, C., & Strozzi, F. (2012). Supply chain risk management: a new methodology for a systematic literature review. Supply Chain Management:

An International Journal, 17(4), 403–418.

https://doi.org/10.1108/13598541211246558

Coppedge, B. B. (2010). Transferring tacit knowledge with the movement of people:

A delphi study (Order No. 3448393). Available from ProQuest Dissertations

& Theses Global. (860122271). Retrieved from

(28)

http://eserv.uum.edu.my/docview/860122271?accountid=42599.

Cox, B. L., & Jantti, M. (2012). Capturing business intelligence required for targeted marketing, demonstrating value, and driving process improvement. Library &

Information Science Research, 34(4), 308–316.

https://doi.org/10.1016/j.lisr.2012.06.002

Cox, B., & Jantti, M. (2012). Capturing business intelligence required for targeted marketing , demonstrating value , and driving process improvement. Library and Information Science Research, 34(4), 308–316.

Creswell, W. (2007). Qualitative Inquiry & Research Design: Choosing Among Five Approaches. Thousand Oaks, CA: Sage Publications.

Ćurko K., Vukšić V. B. & Merkaš V. (2016). Application of Business Intelligence Technology in Croatian companies: Preliminary research and Case study.

WSEAS Transactions on Business and Economics. Volume 13, 2016. E- ISSN: 2224-2899

Curko, K., Vuksic, V., & Merkas, Z. (2016). Usage of business intelligence technology in croatia: Preliminary research. WSEAS Transactions on Business and Economics, 13, 591–596.

Daland, H. (2016). Managing Knowledge in Academic Libraries Are we? Should we? LIBER QUARTERLY, 26(1), 28–41. https://doi.org/10.18352/lq.10154.

Davenport, T. H. (2015) Process Management for Knowledge Work. In: Brocke, V.

J., & Rosemann, M. Handbook on Business Process Management 1:

Introduction, Methods, and Information Systems (International Handbooks on Information Systems) (2nd ed. 2015 ed.). Berlin, Heidelberg: Springer Davidson, C. (2009). Transcription: Imperatives for Qualitative Research.

International Journal of Qualitative Methods, 8(2), 35–52.

https://doi.org/10.1177/160940690900800206

Day, E. (2002). Me, My * self and I : Personal and Professional Re-Constructions in Ethnographic Research. Forum: Qualitative Social Research, 3(3), 1–23.

De Mauro, A., Greco, M., Grimaldi, M., & Ritala, P. (2018). Human resources for Big Data professions: A systematic classification of job roles and required skill sets. Information Processing & Management, 54(5), 807–817.

https://doi.org/10.1016/j.ipm.2017.05.004.

(29)

de Saussure, L., & Rocci, A. (2016). Verbal communication . An introduction. In A.

Rocci & L. de Saussure (Eds.), Verbal Communication (Vol. 3, pp. 3–20).

Berlin: De Gruyter

Deshpande, P. S., Sharma, S. C., & Peddoju, S. K. (2019). Security and Data Storage Aspect in Cloud Computing (Vol. 52). Springer Singapore.

https://doi.org/10.1007/978-981-13-6089-3

Dimzov, S., Matošić, M., & Urem, I. (2021). University rankings and institutional affiliations: Role of academic librarians. The Journal of Academic Librarianship, 47(5), 102387. https://doi.org/10.1016/j.acalib.2021.102387 Dixon, C., Green, J., Yeager, B., Baker, D., & Franquiz, M. (2000). “ I Used To

Know That ”: What Happens When Reform Gets Through The Classroom Door. Bilingual Research Journal, 24(1&2), 1–14.

Dong Sihui, & Xu Xueguo. (2016). Research on tacit knowledge mining of university libraries based on data mining. 2016 13th International Conference on Service Systems and Service Management (ICSSSM). Kunming, China:

IEEE. https://doi.org/10.1109/icsssm.2016.7538426.

Ducharme, F. A. M. & Angelleli, L. A. (2014). Cognitive Analytics: A Step Towards Tacit Knowledge? Journal of Systemics, Cybernetics and Informatics, 12(4), 32 - 38.

Egbu, C. O., Hari, S., & Renukappa, S. H. (2005). Knowledge management for sustainable competitiveness in small and medium surveying practices.

Structural Survey, 23(1), 7–21. https://doi.org/10.1108/02630800510586871 Elliott, C., Dewland, J., Martin, J. R., Kramer, S., & Jackson Sr., J. J. (2016).

Collaborate and Innovate: The Impact of Academic Librarians on the Commercialization of University Technology. Journal of Library Administration, 57(1), 36–48.

https://doi.org/10.1080/01930826.2016.1215674

Esfahanipour, A., & Montazemi, A. R. (2015). Application of Cognitive Map in Knowledge Management. In Khosrow-Pour, D.B.A., M. (Ed.), Encyclopedia of Information Science and Technology, Third Edition (pp. 1112-1122). IGI Global. http://doi:10.4018/978-1-4666-5888-2.ch106

Faradillah, F., Ermatita, E., & Rini, D. P. (2020). Knowledge Management Barriers

(30)

in Higher Education: Strategic Issues at Private University. Proceedings of the Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019). Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019), Palembang, Indonesia. https://doi.org/10.2991/aisr.k.200424.027

Farzaneh, M., Isaai, M. T., Arasti, M. R., & Mehralian, G. (2018). A framework for developing business intelligence systems: A knowledge perspective.

Management Research Review, 41(12), 1358–1374.

https://doi.org/10.1108/MRR-01-2018-0007

Fatima, A., & Linnes, C. (2019). The Status of Business Intelligence in Small and Medium Size Enterprises in Norway. American Journal of Information Technology, 9(2), 1–25.

February, S. (2018). A Best Practise Business Intelligence Framework for the Telecommunications Industry: An Empirical Study. International Journal of Strategic Decision Sciences, 9(2), 38–53.

Fenton-O’Creevy, M., & van Mourik, C. (2016). ‘I understood the words but I didn’t know what they meant’: Japanese online MBA students’ experiences of British assessment practices. Open Learning: The Journal of Open, Distance

and e-Learning, 31(2), 130–140.

https://doi.org/10.1080/02680513.2016.1177503

Ferreira, D. R., &Simoes, P. (2016). A Rule-Based Approach to the Implementation of Business Processes in Normalized Systems. 2016 IEEE 18th Conference on Business Informatics (CBI). Paris, France: IEEE.

https://doi.org/10.1109/cbi.2016.32.

Forey, G (2014) Offshore outsourcing: The need for applicable linguistics. In:

Bhatia, V, Bremner, S (eds) Professional Communication Handbook. Oxon:

Routledge, pp. 382–399

Fourie, L. C. H., Schilawa, J. & Cloete, E. (2004). The value of concept maps for knowledge management in the banking and insurance industry. In Proceedings of the First International Conference on Concept Mapping (Cañas AJ, Novak JD, Gonzalez FM, Eds), Pamplona, Spain.

François, J. (2018). The Stance of Systemic Functional Linguistics Amongst

(31)

Functional ( ist ) Theories of Language and Its ‘ Systemic ’ Purpose. In Perspectives from Systemic Functional Linguistics (pp. 6–25). London:

Routledge

Gartner. (2020). 2020 Gartner Magic Quadrant for Analytics and Business Intelligence Platforms. Microsoft Corporation. Retrieved from https://info.microsoft.com/ww-landing-2020-gartner-magic-quadrant-for-

analytics-and-business-intelligence.html?LCID=EN-US

Georgiou, I., Heck, J., & Mrvar, A. (2018). The Analysis of Interconnected Decision Areas: A Computational Approach to Finding All Feasible Solutions. Group Decision and Negotiation, 28(3), 543–563. https://doi.org/10.1007/s10726- 018-9607-5

Geromin, M. H. (2015). Tacit knowledge sharing at Higher Education Institutions and its impact on the creation of new competitive niches. A Doctor of Philosophy Thesis. School of Management. University of Bath.

Geromin, M. H. (2015). Tacit knowledge sharing at Higher Education Institutions and its impact on the creation of new competitive niches [Doctoral Dissertation]. University of Bath.

Ghafar, N. A., & Idris, N. (2018). Reflection Of Doing Post Modern Ethnographic Research On The Dilemmas Of Working Omani Mothers. Jurnal Kemanusiaan, 16(1), 41–46.

Ghosh, R., Haider, S., & Sen, S. (2015). An integrated approach to deploy data warehouse in business intelligence environment. Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT). Hooghly, India: IEEE.

https://doi.org/10.1109/c3it.2015.7060115

Gil, J. M. (2016). A Relational Account of the Spanish Noun Phrase. Australian

Journal of Linguistics, 36(1), 22–51.

https://doi.org/10.1080/07268602.2016.1109429

Gioia, D. A., & Thomas, J. B. (1996). Identity, Image, and Issue Interpretation:

Sensemaking During Strategic Change in Academia. Administrative Science Quarterly, 41(3), 370. https://doi.org/10.2307/2393936

Giordano, R. G. P., Uricchio, V & Vurro, M. (2007). Integrating conflict analysis

(32)

and consensus reaching in a decision support system for water resource management. Journal of Environmental Management, 84(2), 213–228.

Gleason, J., Berg, M., & Huang, J. G. (2017). Patterns of oral Choice and Evaluation across secondary content areas. Language and Education, 32(2), 93–111.

https://doi.org/10.1080/09500782.2017.1391279

Goffin, K., &Koners, U. (2011). Tacit Knowledge, Lessons Learnt, and New Product Development. Journal of Product Innovation Management, 28(2), 300–318.

https://doi.org/10.1111/j.1540-5885.2010.00798.x

Gong, T., Baronchelli, A., Puglisi, A., & Loreto, V. (2011). Exploring the Roles of Complex Networks in Linguistic Categorization. Artificial Life, 18(1), 107–

121. https://doi.org/10.1162/artl_a_00051

Grant, K., & Dumay, J. (2015). Leading Issues in Knowledge Management Volume 2 (2nd ed.). Reading, United Kingdom: ACPIL

Gruber, T. R. (1993). A translation approach to portable ontology specifications.

Knowledge acquisition, 5(2), 199-220.

Gunjal, B. (2019). Knowledge Management: Why Do We Need it for Corporates.

SSRN Electronic Journal, 37–50. https://doi.org/10.2139/ssrn.3375572

Gupta, P., Mehrotra, D., & Sharma, T. K. (2018). Role of decision tree in supplementing tacit knowledge for Hypothetico-Deduction in higher education. International Journal of System Assurance Engineering and Management, 9(1), 82–90. https://doi.org/10.1007/s13198-016-0483-6

Guster, D. & Brown, C. G. (2012). The application of business intelligence higher education: Technical and managerial perspectives. Journal of Information Technology. vol. 23, pp. 42-62

Habibi, A., Sarafrazi, A., & Izadyar, S. (2014). Delphi Technique Theoretical Framework in Qualitative Research. The International Journal Of Engineering And Science, 3(4), 8–13.

Hadikusumo, B. H. W., & Rowlinson, S. (2004). Capturing Safety Knowledge Using Design-for-Safety-Process Tool. Journal of Construction Engineering and Management, 130(2), 281–289. https://doi.org/10.1061/(asce)0733- 9364(2004)130:2(281)

Haldin‐Herrgard, T. (2000). Difficulties in diffusion of tacit knowledge in

(33)

organizations. Journal of Intellectual Capital, 1(4), 357–365.

https://doi.org/10.1108/14691930010359252

Haldin-Herrgard, T. (2004). Diving Under the Surface of Tacit Knowledge.

Department of Management and Organization, Swedish School of Economics and Business Administration in Vasa, Finland. Retrieved from http://www.coalescentknowledge.com/WP/diving.pdf

Hartmann, E., Gemunden, H. G., & Alwis, R. S. (2004). The role of tacit knowledge in innovation management. Paper presented at the 2004 IMP-conference.

Retrieved from http://www.impgroup .org/uploads/papers/4585.pdf

Hassan, H. (2021). Impact of organisational factors on tacit knowledge sharing in HEIs: Focusing the mediating role of KM system quality. Management Science Letters, 1621–1628. https://doi.org/10.5267/j.msl.2020.12.010

Heisig, P., Suraj, O. A., Kianto, A., Kemboi, C., Perez Arrau, G., & Fathi Easa, N.

(2016). Knowledge management and business performance: global experts’

views on future research needs. Journal of Knowledge Management, 20(6), 1169–1198. https://doi.org/10.1108/jkm-12-2015-0521.

Hellsten, P., & Myllärniemi, J. (2019). Business Intelligence Process Model Revisited. Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 341–348. https://doi.org/10.5220/0008354503410348

Henkel, M. (2000). Academic identities and Policy Change in Higher Education.

Jessica Kingsley Publishers Ltd., London

Herbst, P., & Kosko, K. W. (2013). Using representations of practice to elicit mathematics teachers’ tacit knowledge of practice: a comparison of responses to animations and videos. Journal of Mathematics Teacher Education, 17(6), 515–537. https://doi.org/10.1007/s10857-013-9267-y

Hernandez-Matias, J. C., Vizan, A., Perez-Garcia, J., & Rios, J. (2008). An integrated modelling framework to support manufacturing system diagnosis for continuous improvement. Robotics and Computer-Integrated Manufacturing, 24(2), 187–199. https://doi.org/10.1016/j.rcim.2006.10.003 Herrera, F. E., Herrera, V. & Verdegay, J. (1996). A model of consensus in group

decision making under linguistic assesments. Fuzzy Sets and Systems, 78(1),

(34)

73–87.

Herschel, R. T., & Jones, N. E. (2005). Knowledge management and business intelligence: the importance of integration. Journal of Knowledge Management, 9(4), 45–55. https://doi.org/10.1108/13673270510610323.

Hjørland, B. (2018). Library and Information Science (LIS), Part 1. KNOWLEDGE ORGANIZATION, 45(3), 232–254. https://doi.org/10.5771/0943-7444- 2018-3-232

Hojas-Mazo, W., Simón-Cuevas, A., de la Iglesia Campos, M., Romero, F. P., &

Olivas, J. A. (2018). A Concept-Based Text Analysis Approach Using Knowledge Graph. In J. Medina, M. Ojeda-Aciego, J. L. Verdegay, D. A.

Pelta, I. P. Cabrera, B. Bouchon-Meunier, & R. R. Yager (Eds.), Information Processing and Management of Uncertainty in Knowledge-Based Systems.

Theory and Foundations (Vol. 854, pp. 696–708). Springer International Publishing. https://doi.org/10.1007/978-3-319-91476-3_57

Holford, W. D. (2018). An agential realist perspective on the construction and flow of knowledge: The case of dynamic entanglement and “cuts” within an aircraft engine manufacturing workplace. Journal of Knowledge Management, 22(7), 1442–1470. https://doi.org/10.1108/JKM-08-2017-0342 Holsapple, C., Lee-Post, A., & Pakath, R. (2014). A unified foundation for business

analytics. Decision Support Systems, 64, 130–141.

https://doi.org/10.1016/j.dss.2014.05.013

Huang, R., Sato, A., Tamura, T., Ma, J., & Yen, N. Y. (2014). Towards next- generation business intelligence: an integrated framework based on DME and KID fusion engine. Multimedia Tools and Applications, 76(9), 11509–11530.

https://doi.org/10.1007/s11042-014-2387-2

Hurwitz, J. S., Kaufman, M., & Bowles, A. (2015). Cognitive Computing and Big Data Analytics (1st ed.). Indianapolis, USA: John Wiley & Sons, Inc

Hurwitz, J., Kaufman, M., & Bowles, A. (2015). Cognitive computing and big data analytics. Wiley.

Imhoff, C., & White, C. (2013). Collaborative BI: Theory becomes reality. Business Intelligence Journal, 18(2), 40-46

Jaura, M., &Michailova, S. (2014). Cognition and knowledge sharing in post-

(35)

acquisition integration: insights from Indian IT acquiring firms. Journal of Asia Business Studies, 8(2), 146–167. https://doi.org/10.1108/jabs-05-2012- 0027

Jayakrishnan, M., Mohamad, A., & Yusof, M. (2018). Assimilation of Business Intelligence (BI) and Big Data Analytics (BDA) Towards Establishing Organizational Strategic Performance Management Diagnostics Framework:

A Case Study. Journal of Digital Information Management, 16(1), 22–32.

Jeni, P. R. J., Kennedy, R. P., & Sankaran, K. S. (2019). Reliable army knowledge management process using perception tacit knowledge with xenogeneic deep neural networks. Int. J. Knowledge Management Studies, 10(1), 48–57.

Jennex, M. E. (2015). Knowledge Management. Wiley Encyclopedia of Management, 1–6. https://doi.org/10.1002/9781118785317.weom070035 Jifaa, G. &Lingling, Z. (2014). Data, DIKW, Big data and Data science. 2nd

International Conference on Information Technology and Quantitative Management, ITQM.

Jin-Feng, W., Ming-Yan, C., Li-Jie, F., & Jun-Ju, Y. (2017). The Construction of Enterprise Tacit Knowledge Sharing Stimulation System Oriented to Employee Individual. Procedia Engineering, 174, 289–300.

https://doi.org/10.1016/j.proeng.2017.01.139

Jones, K., &Salo, D. (2018). Learning Analytics and the Academic Library:

Professional Ethics Commitments at a Crossroads. College & Research Libraries, 79(3), 304–323. https://doi.org/10.5860/crl.79.3.304

Kaisler, S. H., Espinosa, J. A., Armour, F., & Money, W. H. (2014). Advanced Analytics -- Issues and Challenges in a Global Environment. 2014 47th Hawaii International Conference on System Sciences. Waikoloa, Hawaii:

IEEE. https://doi.org/10.1109/hicss.2014.98

Kamoun-Chouk, S., Berger, H., & Sie, B. H. (2017). Towards Integrated Model of Big Data (BD), Business Intelligence (BI) and Knowledge Management (KM). In L. Uden, W. Lu, & I.-H. Ting (Eds.), Knowledge Management in Organizations (Vol. 731, pp. 482–493). Springer International Publishing.

https://doi.org/10.1007/978-3-319-62698-7_40

Kanehisa, M., Goto, S., Sato, Y., Kawashima, M., Furumichi, M., & Tanabe, M.

(36)

(2013). Data, information, knowledge and principle: back to metabolism in KEGG. Nucleic Acids Research, 42(D1), D199–D205.

https://doi.org/10.1093/nar/gkt1076

Karagiannis, A., Vassiliadis, P., &Simitsis, A. (2013). Scheduling strategies for efficient ETL execution. Information Systems, 38(6), 927–945.

https://doi.org/10.1016/j.is.2012.12.001

Kelly, J. E. (2015). Computing, cognition and the future of knowing How humans and machines are forging a new age of understanding. IBM Corporation.IBM

Global Services. Retrieved from https://cloud.report/Resources/Whitepapers/e55108d4-92bd-428a-b432-

64530b50c6b9_Computing_Cognition_WhitePaper.pdf

Khan, Z., &Vorley, T. (2017). Big data text analytics: an enabler of knowledge management. Journal of Knowledge Management, 21(1), 18–34.

https://doi.org/10.1108/jkm-06-2015-0238.

Koo, O. (2018). The Effect of Team-based Learning (TBL) on Leadership, Empowerment, and Followership of Nursing Students. Indian Journal of Public Health Research & Development, 9(12), 2098–2103.

Koskinen, K. U., & Vanharanta, H. (2002). The role of tacit knowledge in innovation processes of small technology companies. International Journal of Production Economics, 80(1), 57–64. https://doi.org/10.1016/s0925-5273(02)00243-8 Kuwashima, K. (2014). How to Use Models of Organizational Decision Making?

Annals of Business Administrative Science, 13(4), 215–230.

https://doi.org/10.7880/abas.13.215

Leake, B. D., Maguitman, A., Reichherzer, T., Canas, A. J. & Carvalho, M. (2003).

Aiding knowledge capture by searching for extensions of knowledge models.

in Proceedings of the 2nd International Conference on Knowledge Capture.

ACM Press, Sanibel Island, FL, USA, 23–25 October, pp. 44–53.

Li, W. (2018). Perspectives from Systemic Functional Linguistics. Social Semiotics, 29(5), 738–740. https://doi.org/10.1080/10350330.2018.1532665

Liew, A. (2013). DIKIW: Data, information, knowledge, intelligence, wisdom and their interrelationships. Business Management Dynamics, 2(10), 49

Liou, Y. (1992). Collaborative Knowledge Acquisition. Expert Systems with

(37)

Applications, 5, 1–13.

Madhusudhan, M., & Singh, V. (2016). Integrated library management systems. The Electronic Library, 34(2), 223–249. https://doi.org/10.1108/el-08-2014-0127 Maiden, N. A. M., & Rugg, G. (1996). ACRE: selecting methods for requirements

acquisition. Software Engineering Journal, 11(3), 183.

https://doi.org/10.1049/sej.1996.0024

Marshall, B., Cardon, P., Poddar, A., & Fontenot, R. (2013). Does Sample Size Matter in Qualitative Research?: A Review of Qualitative Interviews in is Research. Journal of Computer Information Systems, 54(1), 11–22.

https://doi.org/10.1080/08874417.2013.11645667

Martin, A. (2017). Impact of Tacit Knowledge Deficits in Acute Care Hospital Settings [Doctoral Dissertation]. Baker College.

Maté, A., & Trujillo, J. (2011). Incorporating Traceability in Conceptual Models for Data Warehouses by Using MDA. Conceptual Modeling – ER 2011, 459–

466. https://doi.org/10.1007/978-3-642-24606-7_36

Maxwell, J. (2017). The validity and reliability of research: A realist perspective. In D. Wyse, L. Suter, E. Smith, & N. Selwyn (Eds.), The BERA/SAGE handbook of educational research (Vol. 1, pp. 116–141). SAGE Publications.

McAdam, R., Mason, B., & McCrory, J. (2007). Exploring the dichotomies within the tacit knowledge literature: towards a process of tacit knowing in organizations. Journal of Knowledge Management, 11(2), 43–59.

https://doi.org/10.1108/13673270710738906

McGrath, L., Negretti, R., & Nicholls, K. (2019). Hidden expectations: scaffolding subject specialists’ genre knowledge of the assignments they set. Higher Education, 78(5), 835–853. https://doi.org/10.1007/s10734-019-00373-9 McVey, L., Lees, J., & Nolan, G. (2015). Reflective-verbal language and reverie in a

qualitative interview. Counselling and Psychotherapy Research, 16(2), 132–

140. https://doi.org/10.1002/capr.12059

Meyer, B., & Sugiyama, K. (2007). The concept of knowledge in KM: a dimensional model. Journal of Knowledge Management, 11(1), 17–35.

https://doi.org/10.1108/13673270710728213

(38)

Mohajan, H. K. (2016). Sharing of Tacit Knowledge in Organizations: A Review.

American Journal of Computer Science and Engineering, 3(2), 6-19.

Moolman, L. (2020). A cloud based business intelligence framework for a cellular Internet of Things network [Master Thesis]. North-West University.

Moscoso-Zea, O., Andres-Sampedro, & Lujan-Mora, S. (2016). Datawarehouse design for educational data mining. 2016 15th International Conference on Information Technology Based Higher Education and Training (ITHET).

Istanbul, Turkey: IEEE. https://doi.org/10.1109/ithet.2016.7760754

Moscoso-Zea, O., Castro, J., Paredes-Gualtor, J., & Lujan-Mora, S. (2019). A Hybrid Infrastructure of Enterprise Architecture and Business Intelligence &

Analytics for Knowledge Management in Education. IEEE Access, 7, 38778–

38788. https://doi.org/10.1109/ACCESS.2019.2906343

Moscoso-Zea, O., Luján-Mora, S., Cáceres, C. E., & Schweimanns, N. (2016).

Knowledge Management Framework using Enterprise Architecture and Business Intelligence. Proceedings of the 18th International Conference on Enterprise Information Systems, 244–249.

https://doi.org/10.5220/0005916002440249

Moynihan, T. (2002). Coping with IS/IT Risk Management: The Recipes of Experienced Project Managers. London: Springer Verlag.

Muñoz, C. A., Mosey, S., & Binks, M. (2015). The tacit mystery: reconciling different approaches to tacit knowledge. Knowledge Management Research

& Practice, 13(3), 289–298. https://doi.org/10.1057/kmrp.2013.50

Muntean, M. (2018). Business Intelligence Issues for Sustainability Projects.

Sustainability, 10(2), 335. https://doi.org/10.3390/su10020335

Mutanga, A. (2014). A Context-Based Business Intelligence Solution for South African Higher Education. Journal of Industrial and Intelligent Information, 3(2), 119–125. https://doi.org/10.12720/jiii.3.2.119-125

Myhill, D., Jones, S., & Lines, H. (2018). Supporting less proficient writers through linguistically aware teaching. Language and Education, 32(4), 333–349.

https://doi.org/10.1080/09500782.2018.1438468

Nam, D., & Park, K. (2015). Corpus-Based Analysis of Thematic Structure in L2 Writing. Multimedia-Assisted Language Learning, 18(4), 99–120.

(39)

Narayan, S., Sidhu, J. S., Baden-Fuller, C., & Volberda, H. W. (2020). Examining CEOs’ Business Model Schemas: A Cognitive Mapping of Differences Between Industry Insiders and Outsiders. In K. J. Sund (Ed.), New Horizons in Managerial and Organizational Cognition (pp. 15–37). Emerald Publishing Limited. https://doi.org/10.1108/S2397-521020200000004003 Narayana, S. (2020). Interpretable Question Answering using Deep Embedded

Knowledge Reasoning to Solve Qualitative Word Problems [Master Thesis].

Arizona State University.

Natek, S., & Lesjak, D. (2021). Knowledge management systems and tacit knowledge. International Journal of Innovation and Learning, 29(2), 166–

180.

Naumenko, L., & Оliynyk, О. (2018). The Cognitive Approach to Teaching Students English Terminological Lexis of the Subject Field of “Microeconomics.”

Psycholinguistics, 24(2), 236–253. https://doi.org/10.31470/2309-1797-2018- 24-2-236-253

Nelms, K. R. & Porter, A. R. (1985). EFTE: An interactive Delphi method.

Technological Forecasting and Social Change, 28, 43–61.

Nemati, H. R., Steiger, D. M., Lyer, L. S. & Herschel, R. T. (2002). Knowledge warehouse: An architectural integration of knowledge management, decision support, artificial intelligence and data warehousing. Decision Support Systems, 33(2), 143–161.

Neuhaus, P., Raj, A., &Clancey, W. J. (2015). Human-Centered Cognitive Orthoses:

Artificial Intelligence for, Rather than Instead of, the People. AI Magazine, 36(4), 9. https://doi.org/10.1609/aimag.v36i4.2612

Neve, T. O. (2003). Right Questions to Capture Knowledge. Electronic Journal of Knowledge Management, 1(1), 47–54.

Nevo, D. & Chan, Y. (2007). A Delphi study of knowledge management system:

Scope and requirements. Information & Management, 44(6), 583–597.

Nguyen P. V. (2011). Using Data Warehouse to Support Building Strategy or Forecast Business Tend. arXiv:1205.0724v1. Retrieved July 25, 2017, from https://arxiv.org/abs/1205.0724v1.

Nguyen, L., & Shanks, G. (2007). Using Protocol Analysis to Explore the Creative

Figure

Updating...

References

Related subjects :