Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/41820

Mitigating the Threat of Lost Knowledge within Information Technology Departments

File Size Format  
paper0671.pdf 1.36 MB Adobe PDF View/Open

Item Summary

dc.contributor.author Shumaker, Jesse
dc.contributor.author Ward, Kerry
dc.contributor.author Petter, Stacie
dc.contributor.author Riley, Jennifer
dc.date.accessioned 2016-12-29T02:01:34Z
dc.date.available 2016-12-29T02:01:34Z
dc.date.issued 2017-01-04
dc.identifier.isbn 978-0-9981331-0-2
dc.identifier.uri http://hdl.handle.net/10125/41820
dc.description.abstract Experienced information technology professionals leaving an organization creates a risk of losing crucial knowledge. To mitigate this risk, an organization must identify key knowledge holders and develop a plan to transfer their knowledge before these employees leave the organization. This research develops the Knowledge Loss Assessment to identify employees with critical knowledge about important knowledge/skill areas within the IT department. We implemented the Knowledge Loss Assessment within an information technology department of a utility company which resulted in an actionable list of key knowledge holders and a prioritized list of knowledge and skills to transfer to other IT employees within the organization. The results of this study yielded several management principles for researchers and practitioners interested in mitigating the threat of lost knowledge within an information technology department. \
dc.format.extent 10 pages
dc.language.iso eng
dc.relation.ispartof Proceedings of the 50th Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject knowledge management
dc.subject knowledge transfer
dc.subject needs assessment
dc.title Mitigating the Threat of Lost Knowledge within Information Technology Departments
dc.type Conference Paper
dc.type.dcmi Text
dc.identifier.doi 10.24251/HICSS.2017.658
Appears in Collections: Practice-based IS Research Minitrack


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons