Jenifer Arokia Selvi A, Aiswarya B, Poondy Rajan Y, M Geetha
{"title":"The mask of hidden knowledge behind advanced technologies: A case of distress, unlearning and knowledge transfer","authors":"Jenifer Arokia Selvi A, Aiswarya B, Poondy Rajan Y, M Geetha","doi":"10.1177/20438869231210577","DOIUrl":null,"url":null,"abstract":"This case study delves into a novel concept termed ‘knowledge hiding’, which refers to the deliberate act of concealing information within the context of contemporary workplace technology usage. It investigates the obstacles related to the transfer of knowledge among employees, often obstructed by self-interest and time constraints. The narrative centres around an employee named Pradeep Dhev, who heavily relies on a colleague for guidance and assistance in his application process responsibilities. This behaviour adversely impacts organisational operational efficiency. In this account, we explore the potential ramifications of technology knowledge gaps, particularly in the context of a custom application process known as ‘PRIAG’, exclusively developed for a specific organisation to boost productivity and optimise return on investment. However, the anticipated outcomes have not materialised as expected due to employees’ unethical reluctance to share their knowledge, driven by ambitions for advancement within the organisation. This situation creates substantial psychological pressure for mid-career employees like Dhev, who holds a G3 level position, leading to feelings of inferiority, psychological distress and the challenges of unlearning certain behaviours. The concept of knowledge hiding encompasses three interrelated components: ‘evasive hiding, rationalised hiding and playing dumb’. This study investigates the predictors of knowledge hiding and contributes to existing literature by emphasising the importance of employee training and development. It also raises awareness about the adverse effects of avoiding knowledge sharing on overall productivity and an employee’s mental well-being. To address this issue, the study suggests the application of theories such as the Interdependence Theory (IT) and Social Identity Theory (SIT), which provide valuable insights and strategies to mitigate challenges related to knowledge transfer and technology learning in the workplace. Additionally, organisations can consider maintaining a knowledge transfer database through blockchain or cloud computing to enhance overall performance and productivity.","PeriodicalId":37921,"journal":{"name":"Journal of Information Technology Teaching Cases","volume":"44 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Technology Teaching Cases","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/20438869231210577","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
This case study delves into a novel concept termed ‘knowledge hiding’, which refers to the deliberate act of concealing information within the context of contemporary workplace technology usage. It investigates the obstacles related to the transfer of knowledge among employees, often obstructed by self-interest and time constraints. The narrative centres around an employee named Pradeep Dhev, who heavily relies on a colleague for guidance and assistance in his application process responsibilities. This behaviour adversely impacts organisational operational efficiency. In this account, we explore the potential ramifications of technology knowledge gaps, particularly in the context of a custom application process known as ‘PRIAG’, exclusively developed for a specific organisation to boost productivity and optimise return on investment. However, the anticipated outcomes have not materialised as expected due to employees’ unethical reluctance to share their knowledge, driven by ambitions for advancement within the organisation. This situation creates substantial psychological pressure for mid-career employees like Dhev, who holds a G3 level position, leading to feelings of inferiority, psychological distress and the challenges of unlearning certain behaviours. The concept of knowledge hiding encompasses three interrelated components: ‘evasive hiding, rationalised hiding and playing dumb’. This study investigates the predictors of knowledge hiding and contributes to existing literature by emphasising the importance of employee training and development. It also raises awareness about the adverse effects of avoiding knowledge sharing on overall productivity and an employee’s mental well-being. To address this issue, the study suggests the application of theories such as the Interdependence Theory (IT) and Social Identity Theory (SIT), which provide valuable insights and strategies to mitigate challenges related to knowledge transfer and technology learning in the workplace. Additionally, organisations can consider maintaining a knowledge transfer database through blockchain or cloud computing to enhance overall performance and productivity.
期刊介绍:
The Journal of Information Technology Teaching Cases (JITTC) provides contemporary practical case materials for teaching topics in business and government about uses and effectiveness of technology, the organisation and management of information systems and the impacts and consequences of information technology. JITTC is designed to assist academics, scholars, and teachers in universities and other institutions of executive education, as well as instructors of organizational training courses. Case topics include but are not restricted to: alignment with the organization, innovative uses of technology, emerging technologies, the management of IT, including strategy, business models, change, infrastructure, organization, human resources, sourcing, system development and implementation, communications, technology developments, technology impacts and outcomes, technology futures, national policies and standards.