{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:08:31Z","timestamp":1754154511117,"version":"3.41.2"},"reference-count":24,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2008,11,14]],"date-time":"2008-11-14T00:00:00Z","timestamp":1226620800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11,14]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The paper seeks to offer a generalized methodology for knowledge auditing. The context of information and knowledge perspectives is established and knowledge auditing is located in an evolving context of information research and practice.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A 15\u2010element inventory is developed which takes its design from business strategy and process and links it to the generalized cycle of information and communication activity.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The elements are systematically reviewed in terms of a general aspect, a typical interpretation and a threshold to indicate the type of practical application and data representation associated with each element.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The model is widely adaptable to different settings as a tool for business enterprises, organizations in different sectors and for use in communities of practice and learning\/knowledge settings.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This is an area of application where a more standard framework approach to information and knowledge auditing would be beneficial. The structure provides a working basis for further development.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00012530810924285","type":"journal-article","created":{"date-parts":[[2008,11,22]],"date-time":"2008-11-22T07:01:22Z","timestamp":1227337282000},"page":"583-599","source":"Crossref","is-referenced-by-count":1,"title":["Recording knowledge\u2010related activities in practice"],"prefix":"10.1108","volume":"60","author":[{"given":"Stephen A.","family":"Roberts","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022031019502367200_b1","doi-asserted-by":"crossref","unstructured":"Botha, H. and Boon, J.A. (2003), \u201cThe information audit: principles and guidelines\u201d, Libri, Vol. 53 No. 1, pp. 23\u201038.","DOI":"10.1515\/LIBR.2003.23"},{"key":"key2022031019502367200_b2","unstructured":"Burk, C.F. and Horton, F.W. (1988), Infomap: A Complete Guide to Discovering Corporate Information Resources, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022031019502367200_b3","doi-asserted-by":"crossref","unstructured":"Burnett, S., Illingworth, L. and Webster, L. (2004), \u201cKnowledge auditing and mapping: a pragmatic approach\u201d, Knowledge and Process Management, Vol. 11 No. 1, pp. 25\u201037.","DOI":"10.1002\/kpm.194"},{"key":"key2022031019502367200_b4","doi-asserted-by":"crossref","unstructured":"Carpenter, S. and Rudge, S. (2003), \u201cA self\u2010help approach to knowledge benchmarking\u201d, Journal of Knowledge Management, Vol. 7 No. 5, pp. 82\u201095.","DOI":"10.1108\/13673270310505403"},{"key":"key2022031019502367200_b5","doi-asserted-by":"crossref","unstructured":"Driessen, S. (2007), \u201cA framework for evaluating knowledge mapping tools\u201d, Journal of Knowledge Management, Vol. 11 No. 2, pp. 109\u201017.","DOI":"10.1108\/13673270710738960"},{"key":"key2022031019502367200_b6","unstructured":"Edvinsson, L. and Malone, M.S. (1997), Intellectual Capital: The Proven Way to Establish Your Company's Real Value by Measuring its Hidden Brainpower, Piatkus, London."},{"key":"key2022031019502367200_b7","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M. and Santos, F.M. (2002), \u201cKnowledge\u2010based view: a new theory of strategy\u201d, in Pettigrew, A., Thomas, H. and Whittington, R. (Eds), Handbook of Strategy and Management, Sage, London, pp. 139\u201064.","DOI":"10.4135\/9781848608313.n7"},{"key":"key2022031019502367200_b9","doi-asserted-by":"crossref","unstructured":"Henczel, S. (2001), The Information Audit: A Practical Guide, K.G. Saur, Munich.","DOI":"10.1515\/9783110974645"},{"key":"key2022031019502367200_b10","doi-asserted-by":"crossref","unstructured":"Henczel, S. (2004), \u201cThe information audit as a first step towards effective knowledge management\u201d, in Hobohm, H.\u2010C. (Ed.), Knowledge Management: Libraries and Librarians Taking up the Challenge, K.G. Saur, Munich, pp. 91\u2010106.","DOI":"10.1515\/9783110955071.91"},{"key":"key2022031019502367200_b8","unstructured":"Hill, M.W. (1994), National Information Policies and Strategies: Overview and Bibliographic Survey, Bowker Saur, East Grinstead."},{"key":"key2022031019502367200_b11","unstructured":"Jashapara, A. (2004), Knowledge Management: An Integrated Approach, Prentice\u2010Hall\/FT, Harlow."},{"key":"key2022031019502367200_b12","doi-asserted-by":"crossref","unstructured":"Lauer, T.W. and Tanniru, M. (2001), \u201cKnowledge management audit: a methodology and case study\u201d, Australian Journal of Information Systems, December, pp. 23\u201042.","DOI":"10.3127\/ajis.v9i1.212"},{"key":"key2022031019502367200_b13","unstructured":"Liebowitz, J. (Ed.) (1999), The Knowledge Management Handbook, CRC Press, Boca Raton, FL."},{"key":"key2022031019502367200_b14","unstructured":"Little, S. and Ray, T. (2005), Managing Knowledge: An Essential Reader, 2nd ed., Open University and Sage, London."},{"key":"key2022031019502367200_b15","unstructured":"Manton, S. (2006), Integrated Intellectual Asset Management: A Guide to Exploiting and Protecting Your Organization's Intellectual Assets, Gower, Aldershot."},{"key":"key2022031019502367200_b16","doi-asserted-by":"crossref","unstructured":"Nonaka, I. and Takeuchi, H. (1995), The Knowledge\u2010creating Company, OUP, Oxford.","DOI":"10.1093\/oso\/9780195092691.001.0001"},{"key":"key2022031019502367200_b17","unstructured":"Orna, E. (1991), Practical Information Policies: How to Manage Information Flow in Organisations, Gower, Aldershot."},{"key":"key2022031019502367200_b18","unstructured":"Orna, E. (2004), Information Strategy in Practice, Gower, Aldershot."},{"key":"key2022031019502367200_b19","unstructured":"Orna, E. (2005), Making Knowledge Visible: Communicating Knowledge through Information Products, Gower, Aldershot."},{"key":"key2022031019502367200_b20","unstructured":"Stewart, T.A. (1997), Intellectual Capital: The New Wealth of Organisations, Nicholas Brealey Publishing, London."},{"key":"key2022031019502367200_b21","unstructured":"Sveiby, K.E. (1997), The New Organisational Wealth: Managing and Measuring Knowledge\u2010Based Assets, Berrett\u2010Koehler, San Francisco, CA."},{"key":"key2022031019502367200_b22","doi-asserted-by":"crossref","unstructured":"Uit Beijerse, R.P. (1999), \u201cQuestions in knowledge management: defining and conceptualising a phenomenon\u201d, Journal of Knowledge Management, Vol. 3 No. 2, pp. 94\u2010110.","DOI":"10.1108\/13673279910275512"},{"key":"key2022031019502367200_b23","doi-asserted-by":"crossref","unstructured":"Wexler, M.N. (2001), \u201cThe who, why and what of knowledge mapping\u201d, Journal of Knowledge Management, Vol. 5 No. 3, pp. 249\u201064.","DOI":"10.1108\/EUM0000000005868"},{"key":"key2022031019502367200_b24","unstructured":"Wilson, T.D. (2002), \u201cThe nonsense of knowledge management\u201d, Information Research, Vol. 8 No. 1, p. 144."}],"container-title":["Aslib Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00012530810924285","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00012530810924285\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00012530810924285\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:36:58Z","timestamp":1753357018000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/60\/6\/583-599\/29222"}},"subtitle":["Methodological bases and a method of knowledge auditing"],"editor":[{"given":"Stephen A.","family":"Roberts","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2008,11,14]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2008,11,14]]}},"alternative-id":["10.1108\/00012530810924285"],"URL":"https:\/\/doi.org\/10.1108\/00012530810924285","relation":{},"ISSN":["0001-253X"],"issn-type":[{"type":"print","value":"0001-253X"}],"subject":[],"published":{"date-parts":[[2008,11,14]]}}}