17
FINDING MEANING, IMPLICATIONS, AND FUTURE DIRECTIONS

17.1 A MANAGEMENT PRACTICE IN SEARCH OF AN OBJECT

Using an approach drawing on discursive psychology, discourse in organizational settings is analysed for how the thematic categories of trust, identity, risk and context are made live, and with what, if any, influence and effect on what are understood as knowledge sharing meeting/forum contexts. In particular, will such an analysis inform an understanding of these thematic categories as tacitly invoked phenomena, and can these themes be shown to be co-relational?

(Summary of indicative research questions, Chapter 11)

This project started out with a view of knowledge management (KM) as a problematic field characterized by its range and scope of debates and issues (see Chapters 14). One might even go so far as to describe it as a management practice in search of an object, in more ways than one. In spite of the broad often competing perspective and theory, there is a persistent theme of knowledge as embedded in or as constituting social interaction within which the “knowing how–knowing that” formulation is considered to be the most important. This led to the speculation that relocating the sphere of interest onto everyday organizational discourse would create the opportunity for studying knowledge work in action. With a particular interest in organizational knowledge sharing (KS), a critical review and analysis of KM research and theory identified a number of factors considered to be influential, in one direction or another, on those types of activities. These were subsequently mapped to the thematic categories of trust, risk, identity, and context. Recall that the latter of these is positioned as the corroborating phenomenon for the relationship between trust, risk, and identity in KS practices, as discussed in Section 8.6.

Taking these themes as the subject, the research reported in the previous five chapters draws on discursive psychology (DP) for both a theory and a methodology for the investigation of KS actions in organizational meeting and online discussion forum discourse. As outlined toward the end of Part One, the research also acknowledges an understanding of tacit knowing as the cognitive “input” resulting from the unconscious, automatic abstraction of information from the environment, which has been shown in studies of implicit learning to be influential on action (the “output”). Lines of connection are drawn between this and the formulation of “knowing how–knowing that” promoted by, for instance, Paul Duguid among others in the KM field. Central to this formulation is the idea that knowing how makes knowing that actionable, with the former representing the “uncodifiable substrate” that informs the use of codified knowledge (the “code”) to borrow Duguid’s terms once again. Tying these points together, it is suggested that the (extended) discursive psychology methodology reveals tacit knowing (knowing how) as an accomplishment in discourse in social interaction—the output mentioned earlier.

Reprising a caveat included in the Introduction, and laid out in more detail in Chapter 9, it is important to differentiate between the concept of knowledge adhered to here and the dualist version of knowledge seen so prominently in the KM field. In referring to “tacit knowing” and “knowing how,” a distinction is not being drawn nor acknowledged between these and explicit knowledge. Knowledge is approached here as a holistic concept comprising both tacit (know how) and explicit (know that) fragments, with the sum of both constituting knowledge. One does not exist without the other.

The principle claim is that the research findings show how these thematic categories are invoked by speakers in meetings where the aim is to share knowledge, that they are corelationally and locally situated. More to the point, they are shown to influence the direction and scope of KS actions. The substance on which these claims are based can be seen in the findings of the focus on context as a generic theme, in which trust, risk, and identity are shown to be invoked by speakers in KS action.

Before establishing the aims, objectives, and directions of this chapter, it is worth a brief pause to reflect back on the KS factors (see Table 1) that underlie the thematic categories.

What is immediately clear is that not all of these (19 in all) could be said to be present in the data. Some are obvious in their absence: “values placed on mentoring,” for instance, and the “time–costs” implication. Interestingly, the analysis that shows up the greatest number of KS factors is “context” (12: as one might expect), with that showing the least being “risk.” Trust has the next highest number present (9). This assessment is not in the least scientifically done, but, as a “gist” picture, one interpretation might be as follows: trust, risk, and identity are pervasive concerns of speakers engaged in KS actions, with trust shown to be the most significant, and risk, the least.

This picture can, fortunately, be easily dismantled. There is sufficient evidence to support the thesis of trust as corelational with risk (see, for instance, Section 8.4 and Chapter 13). There is also sufficient evidence to support the notion of constructed identity as pretty much foundational and fundamental to the accomplishment of discourse in social interaction (see Sections 6.4 and 8.2, and Chapters 14 and 15). Even, for instance, in the attempt to write scientifically and objectively, the subjective creeps in. Recall Margaret Wetherell’s simple but effective insight that to speak (to utter, to write) is to speak from a position of personal beliefs, agendas, values, experiences, preferences, knowledge, and so on. Discourse is a subjective accomplishment.

What, then, can be concluded from this brief retrovisit to the source KS factors? Arguably, the only conclusion that can be drawn is that the KS factors, as sourced from research and theory in the KM field, are for the most part far too specific to the context in which they are originally situated. Moreover, factors such as people’s natural tendency to store and hoard their knowledge and the inhibiting effects of an absence of incentives to share simply do not figure (with the exception of the speculative discussion in Section 13.5) in the present analyses. Collectively what the KS factors did do, though, was prompt an interest in trust, risk, and identity.

The aim of this chapter is to discuss the research findings relevant to the detailed indicative research questions (first stated in Section 11.5.1), which are used as a framework to guide the discussions. Drawing from this, the next section explores the potential implications of these findings in relation to the key issues and debates in KM (see Chapters 14) leading to some future directions for the development of these ideas, and for further research. (The reader is referred to Section 11.5.1 for a reminder of the validation procedures that the present research has employed and Section 11.6 on its potential limitations.)

17.2 FINDING MEANING

17.2.1 Constructing Live Issues and Concerns

In the environment of organizational KS, how are matters of identity, trust and risk constructed as live issues and concerns of speakers?

Taken as a whole, the findings represent a rich and intricate, even bewildering range of discursive devices and strategies which speakers routinely use in their everyday discourse. In the present case, the invoking of trust, risk, and identity as accomplishments in social interaction are shown to work as displays of knowledge of mutually shared understanding of the context and meeting precepts in which those discursive actions take place. A further feature to draw attention to is the implicit nature of these actions: these discursive accomplishments are not the outcome of conscious goal-directed linguistic behavior. That would suggest a distinction between thought and discursive action and inner minds as the “driver behind the wheel” of language. Even the most measured and careful utterance (and there are several examples of this in the data) is a complex mesh of probing the context, sense-making informed by tacit knowing, and a sophisticated orientation to shared understanding.

What is also clear is that while there is a certain amount of consistency in the display of discursive devices and strategies between the different analyses, there is also a great deal of diversity. Bearing in mind the claim that shared understanding is essential to sharing knowledge (see Chapter 16), it is even more bewildering to think that speakers possess an innate understanding of, and ability with, such an extensive communicative “tool set.”

A key finding is that in instances of social interaction where the objective and purpose is to share knowledge, speakers (“speakers/participants” collectively refer to speakers in meetings and forum contributors) are shown to invoke identity, trust, and risk as live concerns. That is, KS is shown to be contingent to these three contexts and more than likely, vice versa. As a caveat, this is not to suggest that these are the only KS influencing discursive contexts—a wider research focus might well reveal others. As a first observation, though, it is quite clear that at the outset of all of the interactions analyzed here few of the speakers explicitly refer to these contexts (one exception being Chapter 16, Extract 3). So how do they emerge in the action? The first research question is concerned with how speakers go about the business of constructing these particular thematic categories: what discursive tools (devices and strategies) are mobilized, and how can such tools be shown to have the effect of constructing trust, risk, and identity as speakers’ live concerns? A consideration of some of the more prominent and commonly deployed of these serves to clarify the findings in respect of these enquiries.

Authenticity

Constructing accounts and reports as authentic is perhaps one of the most common discursive actions in the data, seen in virtually all of the interactions analyzed here, which immediately suggests a fundamental role in KS. What is interesting is the length to which speakers go to formulate their utterances as factual, objective, honest, and beyond dispute: in other words as trustworthy and immune from risk, which in turn are relational with identity. Derek Edwards and his colleague, in their account of Discursive Psychology, list nine different discursive devices that their research shows are used by speakers to construct accounts as factual—in our terms, authentic. Of these, the analyses have found examples of category entitlements (e.g., Section 14.4: the construction of “seasoned exhibitionists”), vivid description (Section 13.4: “uber authenticity” through vivid accounting and Section 16.3.2: doing “gisting and elaboration”), narrative (Section 13.3.3: structuring an account in the form of a narrative), empiricist accounting (Section 14.4.2: orienting to scientific facts), rhetoric of argument (Section 16.4.1: invoking the context of courtroom), extreme case formulations (Section 16.4.1: as a marker of argumentative discourse), consensus and corroboration (Sections 16.3.2 and 16.5: eyewitness accounts have the effect of scripting mutual consensus and corroboration), and lists and contrasts (Sections 15.8.1 and 16.4.1: using three-part lists to construct accounts as factual and complete, also associated with persuasion talk).

It is self-evident that the action of constructing accounts as authentic has direct connotations with trust through orienting to the trustworthiness of accounts, as noted earlier. It is also evident that trust works reflexively in the sense that when a speaker scripts their account as authentic, worthy of trust, they are simultaneously scripting their self as trustworthy. Thus, in invoking trust, one is also invoking identity. Moreover, trust is also reflexive in the sense that speakers and their utterances cannot exist as trustworthy independently of others: claims and identities come into existence in the light of others’ displays of shared consensus. For an account or report to be understood as authentic and trustworthy, it requires cospeakers to index to this understanding. But what of the relation between risk and authenticity?

Discursive actions, which challenge the authenticity of another’s version of affairs, are found to be connected to the context of risk. Recall, for instance, the sequence (Section 13.3, Extract 3) in which one speaker (John) gives an account of financial status: his account is shown to be hedged with caution and an attention to accuracy, reflexively invoking the risks associated with noncompliance with such concerns, it is claimed that John’s response to his colleague’s (Brian) “token of agreement” interprets this as a challenge to the authenticity of his (John’s) account. Both are then shown to be mutually concerned with giving an accurate version of affairs, albeit both giving slightly different versions, and which is interpreted as the two working collaboratively to script an authentic set of events. These actions, it is claimed, effectively set a “benchmark” for what follows in scripting live concerns with truth and accuracy in a high-stakes (risk) context.

An explicit scripting of high stakes and risk can be seen in Chapter 16 (Extract 3). The extract concerns a project proposal given to a client allegedly without anyone on Roger’s team having seen it (which constructs Roger and his team as possessing power over the others and what they do), with Roger overtly referring to the “dangers” of “saying we can do something” and “making assumptions.” This state of affairs is interpreted as risky to the company’s interests, and to its reputation, which again can be seen working reflexively as an account of Roger and his team as the guardians of organizational reputation and well-being. Both speakers are shown to take their concerns with “what really happened” to extremes: trust and authenticity are questioned, and assignation of blame made a live issue. In this extract, a range of discursive devices are displayed, including three-part listing, unmitigated displays of rights to knowledge, facts “out there” as authentic and trustworthy, the extreme attention to accuracy of account (something is either “entirely true” or not true at all), and calling on witnesses. It is these and other features of the extract that result in the sense of “courtroom drama” unfolding. In this one sequence alone, it is claimed that trust, risk, and identity are invoked through shared concerns with authenticity.

Competency Challenge

Another discursive tool that is seen in the data and which is connected to trust, risk, and identity is challenge to competency. Variations on this action can be seen in speakers’ invoking of a context of lack of trust (in another) and blame attribution (Chapter 12), challenge to authenticity (Chapter 13), conjuring potential credibility problems (Chapter 14), the consensus-elaboration (insufficiency) constructs seen in Chapter 15, and the actions around invoking competitive rivalry, the construction of rival groups (Sections 16.3 and 16.4), and the scripting of skeptical rejoinders (Sections 12.5, 12.7, 13.3, 16.3, and 16.4).

Competency challenges are shown to be fundamental to argumentative rhetoric with skeptical rejoinders particularly associated with stance-taking actions—that is, constructing identity from this or that position. What the findings demonstrate is that when speakers are shown to script competency challenges, in one form or another, they are both issuing a challenge to the competency of another while simultaneously working to bolster their own competency. Actions of this type, it is claimed, work up contexts of risk (by implicating the lack of competency of others), trust (in framing one’s own version as the preferred version), and identity (as accomplishing a stance on a particular issue).

A good example of this phenomenon is seen in the construction of two competing versions of the same witness accounts in the discussions around trust (Section 12.5.2). The topic at issue is whether what clients say is relevant as sound evidence of a risk to the project (“four months that’s a long time”) if particular actions are not taken as priority by the project team or whether what clients say is irrelevant and not worthy of notice. The second version of affairs is shown to work to undermine the first and, in so doing, calls into question the first speaker’s (Steve) competence in using such “evidence” when it is in fact groundless according to the second speaker (Damien). The risk that Steve conjures is not only deleted by Damien in his preferred description of what clients say, but this also works reflexively to script Steve’s account as risky in its faulty perspective. Clearly, Damien can only make such a claim if he himself occupies a position of knowledge of what clients say. This exchange on its own does not however produce an effective challenge to competency: this comes to the fore in Damien’s immediately following account of needing “a bigger discussion” on the subject. This implies lack of sufficient discussion to date with the potential for flawed decisions being made, and that this is the real issue, not what clients say. Thus, risk, trust, and identity are displayed as socially constructed, indexical, and locally situated concerns.

Attributing Blame

Displays of knowledge are connected to blame attribution in the context of trust work (Chapter 12) and identity (Chapter 16). Attribution theory is a particularly substantial topic of study in social psychology, and it would be inappropriate to turn the present discussions in those directions in any detail (see Edwards and Potter, 1992, for a succinct summary). From the perspective of DP, attributions are approached as social acts accomplished in discourse rather than the verbal expression of inner mental attitudes about social acts, for instance. The claims made here are that in the context of producing social acts which are interpreted as attributing blame in some direction, speakers are simultaneously shown to work up concerns with trust and identity as tacitly understood contexts. In both of the following examples, blame attribution emerges as the upshot of a complex set of interactional moves by speakers.

In the scenario from Chapter 16, the attribution of blame is shown to be a significant contributing factor to the construction of “them and us,” which is initiated with the invoked context of “courtroom drama.” The attribution of blame is made live by Roger, warranted by the potential risk to reputation posed by the actions of members of John’s team, and his invocation of rights to be alarmed. With blame conjured and attributed in John’s direction, a trajectory of claim and counterclaim ensues implicating the high stakes of the argumentative actions and with no speaker willing to give way. Actions of authenticity and trustworthiness are deployed in bolstering competing accounts: for example, Roger’s three-part listing works as a display of self as the possessor of superior knowledge. What is at stake is the direction of blame attribution. John is shown to deflect blame back in the direction of Roger through issuing a new accusatory claim, which is scripted as even more “inflaming” than Roger’s original accusation. This, it is shown, leads directly to the problematic formulation of “them and us” with all of its connotations of taking sides, blame and fault, and so forth. In this scenario, speakers accomplish matters of trust, identity, and risk as the underpinning constructs to attributing blame, using a range of discursive tools to bolster their mutually competing perspectives.

The scenario from Chapter 12 concerning “something missing” from a software product similarly displays a pattern of blame being made live and attributed, which leads to competing versions of states of affairs. The difference here is that the inaugurator of the blame (Steve) is the agent of its eventual redirection away from his initial target (Damien). The fine-grained analysis of the discourse interprets Steve as “pointing the finger” of blame directly at his colleague. Damien’s interpretation of Steve’s actions as constituting blame are shown in his attempts to reflect blame back by reformulating the source of the problem: the “something missing” could be resolved by spending more money, which is within the governance of the project leader, Steve, and it is his implied failure to do so that results in the “problem.” Eventually, Steve is shown to explicitly reattribute blame away from his colleague (and himself) and onto the software product itself. This scenario particularly displays the consequences for matters of trust, identity, and risk.

Both this and the scenario from Chapter 16 demonstrate how speakers bring matters of trust, risk, and identity into action as locally situated concerns, and this, as the next discussion addresses, has consequences for the actions of KS.

17.2.2 Influencing Knowledge Sharing

It is suggested that such matters or themes are influencing in the context of KS—how and with what effect for speakers and their business?

This is an interesting question, and if shown to be substantiated, it would have particular ramifications for organizational practices of KS and the “knowing how–knowing that” formulation. It is claimed that the analyses and their findings suggest four ways in which KS is influenced by the speakers’ invoked contexts of trust, risk, and/or identity. The first concerns blame attribution, the second implicates actions of consensus, the third concerns the scenarios of financial accounting in Chapter 13, and the fourth centers on the role reversal actions in Chapter 14. The following discussions unpick each of these in turn.

The Attribution of Blame

In two different meetings, one each from Company A and B, blame previously attributed to members present in the meetings is explicitly removed and reattributed to an expressly stated target beyond the meeting participants themselves. This, it is claimed, results in the subsequent voluntary sharing of knowledge appropriate to the goals of the business at hand, and which had not been forthcoming up to that point. Why does it require members to be effectively and explicitly exonerated from blame in order for them to reengage in KS? One suggestion is that the business of sharing knowledge is, in these cases, diverted or prevented by the speakers giving priority to managing attributed blame. That is, they orient to the present threat to their reputation, for instance, over the business of the meeting, which is to share knowledge.

The more acrimonious of the two instances concerns the argument between Steve and Damien (Section 12.7) over the “something missing” from the software, noted in the earlier discussion on attributing blame from the perspective of discursive tools and strategies. The scenario quite quickly develops into questions over Damien’s competence (in, e.g., Steve’s suggestion that his colleague should seek advice from someone else on how to “trick” the software) followed by Steve’s change of strategy toward persuasion and the suggestion that Damien possesses, but is simply not sharing, relevant knowledge and this, it is claimed, implicates an erosion of trust. Changing direction again, Steve suddenly reattributes blame onto the software product itself. It is this action that triggers both a reinstatement of mutual trust and a more detailed sharing of knowledge by Damien.

In the other instance (Section 16.3.2), the action of blame is more subtly accomplished, with its attribution immediately becoming the topic of concern in the three-way dialog between Stuart (meeting leader) and two of his project managers, Dorothy and Mark. The entire gist of the piece is concerned with actors working collaboratively and consensually, first Mark with Dorothy, and then Stuart with both, to arrive at a reasoned and agreed outcome which attributes blame clearly to Team Z. In this scenario, unlike the first, KS actions are not shown to be specifically impeded: they are instead more compromised. That is, their KS actions at this point in the scenario are more concerned with attending to the potential attribution of blame than with sharing the knowledge they have gained as a result of their respective encounters with Team Z. This can also be seen in the two project managers’ volunteered subsequent accounts concerning Team Z after Stuart has exercised rights of full exoneration for the team.

Consensus as a Component in Sharing Knowledge

Consensus has been shown to be displayed in the data in some very different ways and with variable effects for both speakers and hearers. Two of these are considered here: the first is seen in the scenario in Chapter 16, in which two meeting participants are shown to display what is on the other’s mind, with the second drawn from Chapter 15’s discussions of identity construction in an online forum, in particular the “consensus-elaboration” action.

In the meeting example, analysis shows how, of the three meeting participants, the two males display “doing being a team” and mutually shared understanding by repeated use of “collaborative continuers”—that is, one speaker completes the utterance that another has started. On the one hand, this demonstrates active team work and close collaboration, mutual trust and understanding, commonly shared knowledge of context, and so forth. On the other, these actions effectively block the third participant (female) from participating in the KS dialog. A further interpretation drawn is that the two men are conjuring what could be seen as a frequently expressed “mantra.” Or alternatively, rather than seeing the contents of their turns as being “well rehearsed,” it is the deployment of collaborative continuers that is the frequently used discursive strategy. In other words, when these two speakers are together, and the goal is the preparation of some kind of business proposal, they do this a lot.

It is suggested that it is toward this latter understanding that the female participant leans in her counterformulation of “group of females who can multitask,” to which she (obviously) belongs and others do not. The implied order of their “not belonging” is their inability to multitask because they are not female. The upshot is that any potential knowledge contribution from one of three meeting participants is effectively blocked. In this case, then, consensus has a blocking effect, with identity and trust foregrounded.

In the discussion forum, a rather different accomplishment is ascribed to the action of consensus. Here, KS is shown to be mediated by the “consensus-elaboration” strategy in which contributors first orient to preceding contributors/contributions in the discussion, displaying consensus often through explicit opinion markers, and then they elaborate on these same prior turns. They effectively set about adding to the knowledge by sharing more of their own while simultaneously scripting the prior turn (which they are orienting to) as being insufficient. This, it is claimed, is one of the principle actions used by forum contributors in scripting identity as expert with entitlement to be heard as such. An extension to this analysis might even speculate that the “consensus” part of consensus-elaboration turns is very similar to a collaborative continuer in the displays of shared understanding between two contributors. But unlike the meeting example, this display of shared understanding is largely one way and paves the way for competitive claims to more knowledge than previous contributors.

In both of these examples, identity in particular is shown to be implicated in the actions of doing consensus, but with very different consequences for the directions and scope of KS.

The final two cases—financial accounting and role reversal—show singular and perhaps surprising findings rising from events that could be considered to be fairly common in regular organizational meetings. Both display the influencing effects that speakers’ interpretation of context, in this case risk and identity positioning, have on how and what KS unfolds.

Financial Accounting

The risk case is interesting because we have a direct comparison between sales and marketing meetings from the two different participating organizations. In both cases, the account of financial position, given by the meeting chair (Section 13.3), headlines the meeting. This, it is claimed, sets in motion a context of high stakes and risk with a mandate for truth-telling, accuracy, authenticity, and so on, in the giving of reports. Participants’ reports are conjured as accountable and consequential to the financial health of their respective organizations. In other words, the stakes are too high to accommodate for exaggerated, overly embellished, inaccurate, or even misleading accounts. That is where the similarity between the two meetings ends. What is shown is that the way in which the chairs produce the financial reports influences subsequent KS actions.

In the case of Company A, the report is constructed as something to which all meeting participants contribute, as a collaborative accomplishment. With the other meeting, the financial accounting is from the perspective of individual team members or “mini-teams”: individual achievements are compared, judged, and attributed, thus invoking competition and rivalry. Between team member competition and rivalry may be seen as a way of motivating actors to achieve more, surpass their colleagues, or receive publicly attributed award. In theory, members are thus motivated by comparative success and reward. The analysis shows an alternative understanding. In terms of the team’s individual sales performance that may well be the case but, here, the interest lies in the jointly accomplished knowledge sharing activities, and these, it is argued, are shown to be potentially compromised by the financial accounting.

In short, the comparison between the two meetings reveals how the construction of rivalry at the outset of the Company B meeting has the effect of limiting subsequent speakers’ accounts of activities. These accounts, it is claimed, are constructed to give no more than the basics and, in all cases, are not freely volunteered. For instance, when the Chair is shown to invite further elaboration on a particular account (Section 13.3.3), the speaker displays hesitation and circumspection, even reluctance. A direct comparison of a representative example of discourse from each of the meetings (Section 13.5) highlights the considerable difference in levels of detail contained in each.

A further variation between the two meetings can be seen in how the respective chairs call for members’ accounts: Company A’s chair either issues a call to the floor for participants to self-select to initiate the delivery of their account, or he issues a question with a candidate answer to a particular participant. In contrast, Company B’s chair issues calls to report to each participant individually, more often than not with an open-ended question (e.g., “what’s happenin’ in your world”). It is suggested here that the construction of the context of team member rivalry, combined with the way in which participants are called to report, with its display of an absence of knowledge on the part of the chair concerning what is likely to be reported, has the effect of limiting accounts to the bare “facts.”

In contrast, Company A’s meeting accounts are shown to be often vivid and considered. The deviant case (Section 13.4) is an instance from Company A’s meeting in which the participant, it is claimed, uses vivid accounting, quantitative rhetoric, and extreme attention to authenticity to paper over the somewhat vague and insubstantial account of his meeting with prospective clients. In other words, this participant orients to the tacitly understood norms for accuracy, authenticity, trustworthiness, cautious evaluation, and so on, as constructed in social interaction by other participants. While he takes these actions to the extreme, he does not exaggerate and even goes to considerable lengths to formulate his account as highly accurate.

Role Reversal

The last example comes from Chapter 14 in which the analysis focuses on the positioning actions of three participants in a client-contractor meeting. In the first part of the analysis, it is claimed that the strategically accomplished role reversal actions by the contractor (Mike) have the effect of positioning him as the possessor of “what the client wants and needs,” which is worked up as a preferred substitute for any brief that the client (Elaine) may actually have. The upshot of these complex, collaborative actions—for instance, scripting persuasion, trust, corroboration, objective and factual accounting, and potential creditability problems—is that the contractor talks his version of the client’s brief into existence as “what she wants and needs.” He cements this in his scripting of what Elaine should say at a forthcoming meeting with the client’s partners and in their jointly accomplished summary of the “agreed” brief toward the end of their meeting. If it had not been for the arrival of a third participant, that would have been the conclusion of the meeting. However, as we saw in the analysis, the contractor’s version of the brief is in fact misguided, the result of vital information not being shared by Elaine herself.

This is a good example of how the positions that people create for themselves and others through their discursive actions can have a direct effect on KS outcomes. Here, it is not a case of KS being limited, as in the sales and marketing meeting from Company B, but rather its being misdirected.

The variation in effect on KS actions in three of these thematic examples is really quite revealing. The attribution of blame can be both an inhibitor and a trigger: the pattern in both of the scenarios here is “blame made live and attributed directly to an actor or made live with the threat of attribution in the direction of meeting actors” followed by “explicit blame exoneration with blame redirected in an entirely different direction,” which leads to explicit increases in KS. This suggests that if blame is introduced in a meeting context, without its being attributed to any specific actor present in the meeting and subsequently redirected, then it may not have the same effect on KS actions.

The interesting feature about the consensus actions is the suggestion that displays of sharing what is on another’s mind, where other actors are present and who are not included in the “mind sharing” actions, could result in a sense of competitive rivalry (“them and us”)—in this case, seen in the construction of a rival group of “females who multitask.” From the financial accounting scenarios, there is the hint that, if constructing between team member competitive rivalry is seen as a motivating factor in energizing greater accomplishment, this can also be seen to have practical consequences for team KS, with further implications for leading to a fragmented collective team effort. Is motivation in this scenario misguided?

17.2.3 The Corelational Nature of Invoked Concerns

It is also suggested that these themes work corelationally—how is this displayed in discourse in social interaction and with what effect?

There are so many instances where the analyses show the corelational way in which the contexts of trust, risk, and identity are worked up in discourse that they seem to be mutually dependent: that one context cannot “be” without the others. This has a couple of implications, the most significant of which is that these are contexts which the speakers themselves construct as corelational. That is, if trust is invoked—implicitly or explicitly—by one speaker, it is shown to be common knowledge and understanding that risk, for instance, is also implicated. This might, in fact explain how speakers go to such lengths to formulate their accounts as authentic and trustworthy, as we touched on earlier. They are effectively engaging in risk management. This raises a further question: if trust, as an example, is invoked by a speaker without any corelational context of risk and identity, then will it still be orientated to as “trust” by cospeakers?

Paradoxically, however, as the analysis is concerned with the interpretations and sense-making actions of speakers—what they display as shared understood contexts in interaction—this would be difficult if not impossible to substantiate as it would rely on the researcher interpreting a particular construct as being present in the discourse and then showing how cospeakers do not orient to this construct. While analysis is concerned with what is not present in any given set of data, to rely on the interpretation of one speaker, which is not shown to be comparatively shared as understood by other speakers, would result in a potentially invalid analysis. It could also be argued that the fundamental corelational nature of these contexts is such that it would be hard to even imagine a situation in which speakers might collaboratively “do trust” without simultaneously invoking risk and identity as concerns.

Arguably, the most that we can do is accumulate enough cases of corelation to warrant the claim. There is no particular pattern in the data for how speakers display these contexts as corelated. However, a few instances from the data serve as good examples.

In the first, participants in the discussion forum are shown to invoke their identity as expert with appropriate rights to be “heard” as such and as trustworthy (Chapter 15). At the same time, they are shown to display previous contributors as giving insufficient accounts, thus working up a warrant for the necessity of additional explanation. Those additional explanations are explicitly conjured as emanating from the speaker’s experience and knowledge. So, in this case, identity and trust are constructed corelationally, designed to achieve a particular effect: the “I’m the expert because I know more than he does” strategy. The risk element—which in the analysis is related to the public, online nature of the forum—can be seen particularly in how two contributors delicately call one another’s accounts into question while at the same time attending to matters of politeness and face-saving (e.g., Section 15.6). Recall the way that one contributor quite delicately and explicitly scripts his disagreement with a previous contributor (see Section 15.6, Extract 5) in a container of parentheses, conjuring the sense of an “aside” directed only to that contributor. This is an interesting case, which shows how people are willing to debate topics publicly but are nonetheless reluctant to do outright disagreement and argument in such public arenas.

As a further and more complex example of this type of action, recall how Roger, in the actions prior to Extract 3 (Section 16.4), raises a topic of concern with his colleague, John, in the first of the two senior management meetings. He then proposes that it is something that can be dealt with “probably outside of this meeting,” a move that John explicitly resists. It can thus be inferred that while Roger seeks to avoid public disagreement, John works to keep it firmly in the public eye of the other meeting members. It is subsequently speculated that John may have deliberately worked to ensure Roger’s topic stays on the meeting’s agenda, as he is shown to use this as the springboard to launch into an even more “inflaming” topic. In these displays, all three contexts are shown to work relationally and, in fact, quite forcefully, with the result that KS becomes highly contested.

Continuing with this particular meeting analysis, which takes on the characteristics of a courtroom drama scenario (Section 16.4.1), this contains one of the few examples of explicit identity construction in the data: Roger displays himself as alarmed by the events brought about by the actions of John’s team. Consequently, blame is displayed as a live concern for both participants, which in fact becomes the rhetorical object of subsequent interactions. Throughout, speakers are shown to use several rhetorical devices to script themselves and their accounts as more trustworthy than the other (epistemic primacy, for instance).

It has earlier been claimed that trust, risk, and identity are shown to have an influencing effect on KS actions. The corelational nature of these contexts has an effect, which is perhaps even more obvious. Trust, risk, and identity, as contexts mutually invoked by speakers, do more than influence: they mediate KS, either positively or negatively. All of these interactions, including those in the discussion forum, are concerned with the sharing of knowledge, with trust, risk, and identity interpreted as discursive thematic actions that are integral to this accomplishment. This explains the effects of influence discussed earlier.

The final question considers whether these accomplishments can be understood as tacitly done.

17.2.4 A Tacit Accomplishment

It is proposed that these matters are accomplished tacitly as psychological phenomena, with the implication that speakers orient to them as live matters consequent to their understanding of what is going on in the environment (analogous to the automatic, unconscious abstraction of structures and patterns in the environment): how is this displayed and oriented to in discourse?

An important aim of the research is to use the analysis of discourse to show how the various discursive actions, in particular the invocation of trust, risk, and identity, are accomplished tacitly by speakers—both in their scripting and displayed understanding of other speaker’s utterances. Drawing from the study of Implicit Learning, tacit knowing is understood as the product of the unconscious and automatic abstraction of information from the environment and its contents. This is deployed equally automatically and unconsciously in mediating the individual’s sense-making of their context of action, which is shown to influence their own action. Reprising the “knowing how–knowing that” formulation, knowing how, which can be thought of as the “tacit fraction,” is the unspecifiable foundation that makes knowing that actionable and meaningful. Added to this, language is approached as action orientated and consequential for speakers and recipients. The interest in the tacit fragment stems from the field of KM’s attention to the concept of tacit knowledge as a phenomenon of value and as integral to the actions of KS and creating, among others.

A first observation, touched on earlier, is the near absence, with only one or two exceptions, of speakers making explicit reference to contexts of trust, risk, and identity. The interpretation of the discursive action, and the displayed invocation of these contexts, is entirely made through bringing to the fore those contexts which speakers themselves collaboratively and implicitly construct as live concerns. For example, in the two sales and marketing meetings, neither of the two chairs explicitly states the high-stakes nature of the interaction nor mandates that the delivery of participants’ accounts must attend to accuracy, truth, trustworthiness, and authenticity in order to be acceptable. These features, it is claimed, are constructed as integral to their reports and as an unstated requirement on those subsequently made by other meeting participants. In this way, the actors display a shared understanding of a context of high stakes and the necessity of staying within the parameters of acceptability—the shared and displayed understanding of the meetings’ precepts.

A second observation is that these displays of the tacit fragment—shared understanding of context—could not be shown through conventional research methods. It is only through the application of the methodology (and similar methodologies) used here that discourse can be shown to be action orientated, with function and consequence—the majority of which is arguably performed by the actors on what might be termed an unconscious level. Recall Max Boisot’s theory that KS is the consequence of resonance being achieved between the repertoires of different speakers. In his study of KS, M Max Evans also finds shared vision (and trust) to be important influencing factors. If shared vision and resonant repertoires are determinants of KS, it is highly unlikely that conventional methods of investigation would demonstrate this. However, the discourse analysis method adopted in the present study is particularly geared toward how such psychological phenomena, at once both hidden from sight but in plain view, are done as collaborative accomplishments. Even when speakers are shown to be engaged in some serious arguing, they are, despite this, shown to be working collaboratively: it takes two to argue.

It is worth bringing in a particular point concerning the data from Company A. The sales and marketing meeting actions can be seen as a role model for KS as effectively and efficiently done. However, the same company’s project management meeting actions bring to the fore a particular problem concerning dealings with another department within the same firm. This is particularly compounded by the displays of intrateam member support and loyalty, an example being the “gisting and elaboration work” displayed by the project leader. In other words, a kind of “them and us” is implicated, with connotations of between departmental (horizontal) KS issues.

In the same organization, the first of the two senior management meetings brings a sense of “them and us” more bluntly to the fore, with the organization (“them”) scripted as acting irrationally. Then, in second meeting, there is the “ghost” of a contextual difficulty: the decision to use a particular technology on a project, knowing that the technology was not ready to use. It is not stated explicitly that this refers to another person who is not present in the meeting nor is the decision to use this technology explicitly described as being wrong. Instead, it is constructed by Roger as the excuse to “slow down” the project start-up. John’s suggestion that another technology could have been used, the weak acknowledgement of this given by Roger, and the denial by a third speaker that the choice of this particular technology was in fact the reason for “slowing down” the project, combined with Roger’s moves to change the topic, suggest an “uncomfortable truth.” Decisions are perhaps not within the governance of the meeting members. This leads to the speculation that the members of the senior management team lack the power to make important decisions: all they are entitled to do is to make recommendations to a higher level of the business (could this be the level at which the decision to use technology known to be not ready was taken?). This is displayed by at least one member as problematic and can also be seen as a further kind of “them and us.” This has implications for bottom-up (vertical) KS problems.

The following section discusses the research findings in relation to debates and issues in KM summarized and synthesized in Chapter 9, drawing some implications for KM in general.

17.3 RELATING THE FINDINGS TO DEBATES AND ISSUES IN KNOWLEDGE MANAGEMENT

On a practical note, as the focus of the present research has been exclusively on organizational meeting and online discussion forum discourse, the findings can only realistically be seen from those perspectives. Other types of organizational discourse that could be used in future similar projects include KS practices in the context of mentoring and learning and employee exit interviews, for instance, even the contents of “knowledge repositories” such as “expert biographies,” project reports, and consumer surveys. Those, and many other instances, would represent valid, relevant, and potentially advantageous lines of future research. For now, however, the discussions reprise some of KM’s principle concerns in the light of the present findings.

17.3.1 The Central Concern of Knowledge Management with “How” and “What”

Central to KM’s concerns are the questions around “how” to manage knowledge and “what” should be the focus of KM actions. “How” and “what” questions are precisely the concerns of DP—and indeed most other discourse analysis methods. Consequently, the findings demonstrate how speakers (in these instances included here) perform KS actions; how these are constructed as contingent to trust, risk, and identity; and how these thematic categories influence the scope and directions of KS actions. It has also been shown how these themes are invoked by speakers as corelational constructs with a suggestion of covariance. These discursive actions and their consequences for both speakers and hearers are, it is claimed, the outcome of actors’ unconscious and automatic appraisal of the environment and its contents, as displayed in discourse.

As an emic approach to the study of organizational action, the present research methods have revealed phenomena which conventional methods could not because our principle concern is with the contexts and other accomplishments actors themselves display as shared understanding and concerns in discourse. This is contrasted with the etic approach adopted in mainstream research which gives precedence to the researcher’s understanding, interpretation, categorization and so forth over that of participants in the data. It is suggested that such an approach risks irrelevance in foregrounding concerns and understandings that are not necessarily those of the actors.

To address KM’s “what” question—what should our actions and practice focus on—a constructionist view approaches knowledge as constructed in everyday discourse in social interaction, which can be studied directly using discourse analysis methodologies. This moves the focus of interest onto the social relationships integral to discourse. Lawrence Prusak and his colleague, in their review of failure factors in KM, note that a lack of focus on the social aspects of relationships, including trust, is one of the major reasons for high KM failure rates. The empirical research reported here would certainly lend support to this perspective.

Similarly, in relation to KM’s “how” question—how do we manage knowledge—it seems clear from the findings that speakers routinely manage their knowledge in socially enacted discourse. This gives rise to suggestions of some specific cases for how such actions could be mediated, even improved. For instance, the scripting of financial accounting is shown to invoke very particular concerns with high stakes, authenticity, the need for trustworthiness, and so on. How such accounts are made, how they are formulated in relation to the members of a meeting, and at what point in the meeting these are included, have effect on speakers and their actions. There is also the case of “attributing blame”: blame made live and attributed, even theoretically, to group members needs to be firmly removed elsewhere in order to restore normative KS practices. A further point that one could derive from the findings is support for the idea that people routinely and ubiquitously shared knowledge all of the time: it is a normative function of social discourse. But, like the inevitable variance in people’s command of their own language, just because a practice is occasioned in normal everyday action, it does not epiphenomenally follow that they are “good” at it.

This type of study adds to the debates over what KM is, what it should or can be concerned with, by extending the directions already indicated by many researchers and theorists in the KM field. This touches on a couple of issues connected to the previous discussions concerning DP’s relevance to KM, which are considered next.

17.3.2 The “Relevance” Issue Concerning Discursive Psychology

Is it being suggested that KM practitioners should, as a matter of routine, record and analyze their organization’s meetings, trawl through endless documentation, and subject them to the kind of forensic analysis of discourse undertaken here? Well, no, at the very least, that would be impractical. What is suggested is that this particular approach can be seen as an additional and potentially valuable tool in working toward and accomplishing specific goals or in aiding the resolution of specific problems. An example would be where there is a need for a fresh strategy for the management of an organization’s knowledge. Rather than an individual, or a group of people, working in isolation to develop such a strategy (akin to Gergen’s description of the decision-maker making decisions behind closed doors as fraught with problems, in his account of Relational Being), might it not be a better approach to uncover how an organization’s members define and understand “knowledge,” what it means to their work, and what they hold to be the most valuable type of knowledge to the business? That is, in taking an emic approach, as opposed to an etic one, one can tap into the group’s shared common understandings, rather than imposing understanding—which might be alien—from a distance.

This latter point is, I believe, important. Recall some of the ideas in Chapter 1 around what meaning “means.” Both Michael Polanyi and Kenneth Gergen claim that the meaning of a concept takes its form through repeated use, as conventions of language expressed by certain groups at certain times, given certain circumstances. Meaning is, accordingly, the outcome of shared consensus. This suggests that to impose an understanding or definition of any given category is, frankly, unnatural.

A second point, related to the “relevance” issue, concerns DP’s terminology. In short, this is difficult and does not sit well with natural talk (ironically enough). One of the reasons behind this type of terminology is that DP draws on conversation analysis for its methodology. This latter, in its purest form, is very specifically focused on discovering and specifying the “architecture of the structure of verbal interaction” to borrow Robin Wooffitt’s description (see Section 6.3.2). It has developed, of necessity, a complex, precise and very technical vocabulary for accomplishing this. To the layperson, conversation analysis reports might seem like a foreign language, but then analysts are for the most part not addressing the layperson. At the end of Chapter 6, it was speculated that the “sense-making” paradigm promoted by Christian Madsbjerg and his colleague, for instance, could potentially constitute a vocabulary more suited to the organization and its concerns. This has not been explored, but is one potential avenue for future research and development.

17.3.3 A Theory of Language

The KM field, it is concluded, is largely lacking a theory of language (with a noted exception being Nonaka’s reference to Speech Act Theory in his A Dynamic Theory of Organizational Knowledge Creation), despite many theories in KM emphasizing the importance of social interaction as the location of knowledge work. Frank Blackler, for instance, explicitly underlines the key role of communication in his view of organizations as systems of activity. It is argued in Chapter 9 that if one approaches knowledge from such perspectives, and which most in the KM field do in one respect or another, then it makes sense to draw upon a theory of language to inform an understanding and explanation of how knowledge emerges in language. It is hoped that the present research is seen as an example of the potential benefits and progress that could be achieved by doing just this. In the present case, the approach to a theory of language draws on DP and social constructionist theory.

17.3.4 A Different Conceptualization of Knowledge Sharing

In short, the findings from the research project reported here provide support to those theories that specifically locate knowledge work in social interaction and in particular for the formulation of “knowing how–knowing that” (see Section 4.5, Chapter 9, and Section 17.1 for explanations) specific to KS practices. In scoping the research of KS discourse, it was noted that while research and theories in KM identify factors that influence KS, they have little to say on how they influence these practices in action. There are of course some exceptions that offer empirical support for what influences KS—Max Evans’ recent study of trust in organizational KS for instance. It could be argued that the findings here have some coherence with Evans’ findings. The present findings can thus be approached as attempting to at least start to answer the question of how factors influence KS actions, and with what consequences, at a much deeper level. One further point to add is the suggestion that the findings also lend support to those who are critical of an approach to KM which is wholly or mostly focused on IT. The reasons for this should be obvious.

Does this research add up to a different conceptualization of KS? That would be quite a substantial claim to make, and would require considerably more research to warrant. What can be cautiously stated is that the findings open up the potential for an alternative conceptualization of KS. That is, alternative in terms of the conventional approach to KM, but which can be seen in the insights given by, for example Max Boisot, Paul Duguid, and Haridimos Tsoukas. KS, to be effective, relies on speakers’ shared understanding of context, as displayed in interactional discourse, which is influenced by the individual’s personal stocks of “knowing how.” It relies on speakers’ attention to the potential effects of discursive actions such as blamings, high stakes, normative roles and their entitlements, rivalry, and consensus work on KS outcomes. That would suggest that members of organizations might well benefit from training in how to be effective communicators from a discourse-savvy perspective.

17.3.5 A Different Approach to Core Issues in Knowledge Management

Similarly to the previous question, a consideration of some of the other principle concerns in KM from the perspectives of the present findings suggests the potential for an alternative approach. Previous discussions suggested that a strategy drawing on the DP approach renders such matters as the commodification–reification issue, and measuring KM outcomes as irrelevant (see, e.g., Section 9.3). That is essentially justified from the viewpoint of DP as a research methodology. Drawing on this, the commodification–reification formulation of knowledge is effectively dismantled. A strategy, which reifies knowledge as an object or commodity, is dealing with what would be more accurately described as information. It may have intrinsic market value, it may be vital to the organization’s operations and growth, and so forth, but it is information. Knowledge is that which is coconstructed in social interaction between persons. Knowledge exists in the action of reading another’s written words, or interpreting visual displays. Without risking becoming caught in the seemingly endless philosophical arguments over the nature of knowledge, the argument concerning commodification–reification can be rested with the simple claim that what has been displayed in the analyses of the previous chapters is not an objectified knowledge being distributed.

The issue of measuring KM success or failure, from a conventional understanding, is also rendered somewhat meaningless. But, in this case, some alternative questions can be offered in its stead. For instance, on a case by case basis—project teams, Communities of Practice, management teams, and so on—what inhibits and what promotes knowledge work from a discursive perspective? The analyses show considerable variance in outcome from the use of certain discursive strategies—the case of consensus, for instance—and between the different groups of speakers. This suggests that a blanket strategy is unlikely to work. But, again, further research in this particular area may lead to the development of approaches which may, in combining the DP approach with other methods of organizational analysis, realize a method of comparing knowledge work outcomes between groups, for instance, or over time.

Relating the findings to issues around culture, and criticism of the “one size fits all” (see Chapter 3 for discussions), raises an interesting point. The criticism of “one size fits all,” referring to concrete rules and procedures, strategies, and policies (the infamous “checkbox approach”), argues quite reasonably that what suits one organization or team in a particular environment and set of circumstances is unlikely to have pan-generic attributes. In contrast, what the findings suggest is that trust, risk, and identity are universally enacted contexts and concerns in KS discursive action. But care should be taken with the use of “universal” here. What can be claimed is that the data used in the present study, drawn from various sources, shows participants’ commonly displayed shared understandings of these contexts as live concerns. It is an unfortunate limitation of the present study that effects of disparate national cultures, for instance, are not a factor. However, this does suggest a particular line for future research. The point that is speculated is this: one size fits all in the manifestation of rules, processes, and so forth may well not be adequate to the task of mediating the goals and objectives of the organization, but we all communicate using language, we do things with our words, and the uncodifable substrate, it is conjectured, is essential to accomplishing shared understanding.

This raises one final question: why the apparent persistence in adopting the term “tacit knowledge” with its popularly accepted characteristics of difficult to articulate, tricky to share, yet representing the most valuable type of knowledge, when there is a far more practical, pragmatic, and rational formulation—“knowing how–knowing that?” This is perhaps no more than a matter of terminology—“tacit knowledge” sounds more real and tangible and requires less explanation. It is an interesting question. The important point to draw, however, is that the contents of this book are considered to provide empirical support for the knowing how–knowing that formulation of knowledge in the organizational context.

17.4 FUTURE DIRECTIONS

If there is one simple truism that could be drawn, it is this: knowledge work (however you choose to describe and understand it) is an accomplishment of the social interaction between persons, their environment, and its contents, which axiomatically positions discourse—talk and text—in the top chair. Add to this the indexicality of language in the sense that meaning is contingent to the context in which it is embedded and that this context is the fabrication of the speaker, which emerges from and is influenced by their tacit knowing or practical knowledge or knowing how. (Tautology, as should be clear by now, is rife in the field of KM.) What is also true is that discourse, as the source and site of knowledge work, has been somewhat neglected. So, when it was stated that this project has the aim of shifting the focus of interest onto the site of language, what was being proposed in reality was a recognition of the values and advantages to be gained by moving the sphere of interest and action to a much deeper level of organizational action, to the level at which everything transpires.

So what for future directions? There are a couple of directions for further research which we will come to in a moment. In general, it is hoped that the ideas and research findings laid out in these pages will inspire a greater interest in discourse as an organizational resource in KM. Language is, to paraphrase Benjamin Whorf’s proposition, “the best show that man puts on.” It is also hoped that the practice of KM can be steered away from an insistence on process and technology and back in the direction on which it was originally set back in the 1990s by (no irony intended) Ikujiro Nonaka when he argued that the focus of analysis should be on how an organization interacts with its environment and the ways in which it creates and disseminates “information and knowledge.” And all that involves people and discourse. There is a lot to be done.

To complete these discussions, a few specific suggestions for lines of future research. It was suggested at the end of Chapter 6 that the “sense-making” paradigm promoted by Christian Madsbjerg and his colleague, for instance, could potentially offer a vocabulary more suited to the study of the organization and its concerns, which might be adapted for use in DP projects with a focus in these directions. While this has not been explored here, research and development may lead to a more useable terminology and would address the issues raised earlier (Section 17.3.2).

In the earlier discussions around criticism of the “one-size-fits-all” approach, a potential paradox is indicated. From any direction, differences in culture, organization, team, and individual would suggest that such an approach will simply not be effective. But the present research findings suggest that there are commonalities in discourse constructed and shared in interaction. This is not a reference to a commonly shared technical vocabulary within a given team, for instance, but refers to discursive action accomplished at the tacit level. The present research is limited to a small number of organizations and an online discussion forum: a larger scale study would focus on teams in a variety of cultures, multinational organizations, for instance, and multinational teams who come together to solve particular problems, or to take part in particular joint exercises. Such a project would build on the present findings, and those from the (much) broader discourse analysis field, to develop a closer understanding of how and whether discursive action at the tacit level—and the kinds of shared displays of the contexts of trust and identity, for example—is accomplished from a cross-cultural perspective.

Finally, a third potentially fruitful topic for research would be a project aimed at developing a methodology to enable a robust and valid comparative analysis of knowledge outcomes as an accomplishment of discourse in interaction. Directions likely to produce some interesting results could be research comparing outcomes between different teams, and comparing those from the same team over a period of time, perhaps starting with the initial setup of the team. Of course, the key to this particular project’s success lies in the definition of “knowledge outcome”—that is perhaps not so difficult because, in reality, a knowledge outcome is determined by the individual case by case. What is problematic—and something that perhaps should be now consigned to the archive of historic but no longer needed management practices—is the idea of attempting to measure knowledge outcomes and the success or failure of KM as a whole.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.37.89