Combining information systems and Computer Science approaches to identifying source of expsotise

Debbie Richards*, Peter Busch

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

Knowledge is largely contained in the expertise of an organisation's workers. Expertise Location is emerging as an important component of an overall knowledge management strategy for many knowledge intensive organisations. Taking an Information Systems approach to expertise, we see knowledge as embodied in people but to some extent the knowledge can be transferred to others, reused and sometimes codified. Taking a Computer Science viewpoint, we believe we can use approaches such as data-mining of artefacts, such as web pages and documents, containing data about people, projects and product documents to identify who has the needed expertise. In this way we are not focused on capturing what people know but on capturing and reusing information about who knows what.

Original languageEnglish
Title of host publication12th Australian Conference on Knowledge Management and Intelligent Decision Support, ACKMIDS 09 and 20th Australasian Conference on Information Systems, ACIS 2009
Place of PublicationMelbourne, VIC
PublisherACIS
Pages702-711
Number of pages10
Volume36
Publication statusPublished - 2009
Event12th Australian Conference on Knowledge Management and Intelligent Decision Support, ACKMIDS 09 and 20th Australasian Conference on Information Systems, ACIS 2009 - Melbourne, VIC, Australia
Duration: 2 Dec 20094 Dec 2009

Other

Other12th Australian Conference on Knowledge Management and Intelligent Decision Support, ACKMIDS 09 and 20th Australasian Conference on Information Systems, ACIS 2009
Country/TerritoryAustralia
CityMelbourne, VIC
Period2/12/094/12/09

Keywords

  • Codified knowledge
  • Knowledge-based view of the firm
  • Research and development
  • Tacit knowledge

Fingerprint

Dive into the research topics of 'Combining information systems and Computer Science approaches to identifying source of expsotise'. Together they form a unique fingerprint.

Cite this