Identification and Amplification of Tacit Knowledge: The Positive Deviance Approach as Knowledge Management Praxis
Keywords:
knowledge, externalization, knowledge amplification, positive deviance, knowledge management praxisAbstract
Often the answer to solving complex social problems already exists in the community as some type of tacit knowledge, but it is hidden from plain view. By demonstrating how tacit indigenous knowledge can be identified and amplified through a problem‑solving approach known as Positive Deviance (Singhal et al., 2014), this article contributes to the understanding of the knowledge externalization process (Nonaka, 1994). The Positive Deviance (PD) approach is premised on the belief that in every community there are certain individuals or groups whose uncommon behaviours and strategies enable them to find better solutions to problems than their peers, while having access to the same resources. We propose five stages for the identification and amplification of the tacit knowledge in the PD approach. The first stage concerns awareness and breakout of the community “mental prisons.” The second stage refers to identifying the positive deviants—the carriers of the authentic experience and valuable tacit knowledge. The third stage suggests creation of particular conditions to facilitate the “paradigm shift”. The fourth stage indicates self‑discovery as the mechanism of knowledge transfer. Finally, the fifth stage highlights the importance of social proof as the justification mechanism for the adoption of self‑discovered knowledge as community members embrace the new practice. Through an analysis of two highly effective PD implementations in Vietnam and Argentina, we show how unearthing of tacit knowledge is fundamental to the PD approach, and represents a source of creativity and inspiration for finding efficacious solutions.Downloads
Published
Issue
Section
License
Open Access Publishing
The Electronic Journal of Knowledge Maangement operates an Open Access Policy. This means that users can read, download, copy, distribute, print, search, or link to the full texts of articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. The only constraint on reproduction and distribution, and the only role for copyright in this domain, is that authors control the integrity of their work, which should be properly acknowledged and cited.