{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T15:31:58Z","timestamp":1770478318900,"version":"3.49.0"},"reference-count":56,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2009,4,24]],"date-time":"2009-04-24T00:00:00Z","timestamp":1240531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4,24]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Organizations are threatened by business crises that may be prevented or lessened if critical knowledge is identified in advance. The purpose of this paper is to enhance the understanding of the role knowledge management (KM) plays in affecting organizational performance during crises.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A case study of a business crisis was conducted to investigate how KM helped mitigate damage caused by the crisis.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>First, KM plays an important role in crisis management. Second, organizations have different knowledge needs that require the application of different KM strategies at different phases of a business crisis to achieve the best results. Finally, the experience handling crises makes organizations consider their incompetence and thus leads to the generation of organization\u2010wide learning initiatives which facilitate knowledge acquisition, sharing, and institutionalization.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The proposed knowledge\u2010centered crisis management framework can be used by organizations as guidelines to develop their KM strategies based on their concerns during business crises.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Few prior studies have specifically addressed the role KM plays when encountering business crises. This study focuses on investigating how organizations can apply useful KM strategies based on their knowledge needs and thus achieve desirable crisis management outcomes.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635570910948605","type":"journal-article","created":{"date-parts":[[2009,4,27]],"date-time":"2009-04-27T05:41:29Z","timestamp":1240810889000},"page":"445-462","source":"Crossref","is-referenced-by-count":38,"title":["Knowledge management adoption in times of crisis"],"prefix":"10.1108","volume":"109","author":[{"given":"Wei\u2010Tsong","family":"Wang","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022020520153140300_b1","doi-asserted-by":"crossref","unstructured":"Asoh, D.A., Belardo, S. and Duchessi, P. (2007), \u201cKnowledge strategic alignment: research framework, models, and concepts\u201d, in Abou\u2010Zeid, E.\u2010S. (Ed.), Knowledge Management and Business Strategies: Theoretical Frameworks and Empirical Research, IGI Global, Hershey, PA.","DOI":"10.4018\/978-1-59904-486-6.ch009"},{"key":"key2022020520153140300_b2","unstructured":"Baldrige National Quality Program (2008), 2008 Criteria for Performance Excellence, available at www.michiganquality.org\/files\/2008_Business_Nonprofit_Criteria.pdf (accessed December 12, 2008)."},{"key":"key2022020520153140300_b3","doi-asserted-by":"crossref","unstructured":"Connell, C.M. (2004), \u201cTransformation of a business in risks: knowledge and learning for reinvention\u201d, Management Decision, Vol. 42 No. 9, pp. 1178\u201096.","DOI":"10.1108\/00251740410565190"},{"key":"key2022020520153140300_b4","doi-asserted-by":"crossref","unstructured":"Darling, J.R. (1994), \u201cCrisis management in international business: keys to effective decision making\u201d, Leadership and Organization Development Journal, Vol. 15 No. 8, pp. 3\u20108.","DOI":"10.1108\/01437739410073047"},{"key":"key2022020520153140300_b5","unstructured":"Davenport, T.H., De Long, D.W. and Beers, M.C. (1998), \u201cSuccessful knowledge management projects\u201d, Sloan Management Review, Vol. 39 No. 2, pp. 43\u201057."},{"key":"key2022020520153140300_b7","doi-asserted-by":"crossref","unstructured":"De Long, D.W. and Seemann, P. (2000), \u201cConfronting conceptual confusion and conflict in knowledge management\u201d, Organizational Dynamics, Vol. 29 No. 1, pp. 33\u201044.","DOI":"10.1016\/S0090-2616(00)00011-5"},{"key":"key2022020520153140300_b6","doi-asserted-by":"crossref","unstructured":"Dearstyne, B. (2007), \u201cThe FDNY on 9\/11: information and decision making in crisis\u201d, Government Information Quarterly, Vol. 24 No. 1, pp. 29\u201046.","DOI":"10.1016\/j.giq.2006.03.004"},{"key":"key2022020520153140300_b8","doi-asserted-by":"crossref","unstructured":"Dutton, J.E. (1986), \u201cThe processing of crisis and non\u2010crisis strategic issues\u201d, Journal of Management Studies, Vol. 23 No. 5, pp. 501\u201017.","DOI":"10.1111\/j.1467-6486.1986.tb00434.x"},{"key":"key2022020520153140300_b9","doi-asserted-by":"crossref","unstructured":"Earl, M. (2001), \u201cKnowledge management strategies: toward a taxonomy\u201d, Journal of Management Information Systems, Vol. 18 No. 1, pp. 215\u201033.","DOI":"10.1080\/07421222.2001.11045670"},{"key":"key2022020520153140300_b10","doi-asserted-by":"crossref","unstructured":"El\u2010Korany, A. (2007), \u201cA knowledge management application in enterprises\u201d, International Journal of Management and Enterprise Development, Vol. 4 No. 6, pp. 693\u2010702.","DOI":"10.1504\/IJMED.2007.014989"},{"key":"key2022020520153140300_b11","doi-asserted-by":"crossref","unstructured":"Elsubbaugh, S., Fildes, R. and Rose, M.B. (2004), \u201cPreparation for crisis management: a proposed model and empirical evidence\u201d, Journal of Contingencies and Crisis Management, Vol. 12 No. 3, pp. 112\u201027.","DOI":"10.1111\/j.0966-0879.2004.00441.x"},{"key":"key2022020520153140300_b12","unstructured":"Fink, S. (1996), Crisis Management: Planning for the Inevitable, American Management Association, New York, NY."},{"key":"key2022020520153140300_b14","doi-asserted-by":"crossref","unstructured":"Gold, A.H., Malhotra, A. and Segars, A.H. (2001), \u201cKnowledge management: an organizational capabilities perspective\u201d, Journal of Management Information Systems, Vol. 18 No. 1, pp. 185\u2010214.","DOI":"10.1080\/07421222.2001.11045669"},{"key":"key2022020520153140300_b13","doi-asserted-by":"crossref","unstructured":"Grant, R.M. (1996), \u201cToward a knowledge\u2010based theory of the firm\u201d, Strategic Management Journal, Vol. 17, pp. 109\u201022.","DOI":"10.1002\/smj.4250171110"},{"key":"key2022020520153140300_b15","doi-asserted-by":"crossref","unstructured":"Hall, H. (2001), \u201cInput\u2010friendliness: motivating knowledge sharing across intranets\u201d, Journal of Information Science, Vol. 27 No. 3, pp. 139\u201046.","DOI":"10.1177\/016555150102700303"},{"key":"key2022020520153140300_b16","unstructured":"Hansen, M.T., Nohria, N. and Tierney, T. (1999), \u201cWhat's your strategy for managing knowledge?\u201d, Harvard Business Review, Vol. 77 No. 2, pp. 106\u201016."},{"key":"key2022020520153140300_b17","doi-asserted-by":"crossref","unstructured":"Hensgen, T., Desouza, K.C. and Kraff, G.D. (2003), \u201cGames, signal detection, and processing in the context of crisis management\u201d, Journal of Contingencies and Crisis Management, Vol. 11 No. 2, pp. 67\u201077.","DOI":"10.1111\/1468-5973.1102003"},{"key":"key2022020520153140300_b18","doi-asserted-by":"crossref","unstructured":"Holsapple, C.W. and Singh, M. (2001), \u201cThe knowledge chain model: activities for competitiveness\u201d, Expert Systems with Applications, Vol. 20 No. 1, pp. 77\u201098.","DOI":"10.1016\/S0957-4174(00)00050-6"},{"key":"key2022020520153140300_b19","doi-asserted-by":"crossref","unstructured":"Jordan, J. and Jones, P. (1997), \u201cAssessing your company's knowledge style\u201d, Long Range Planning, Vol. 30 No. 3, pp. 392\u20108.","DOI":"10.1016\/S0024-6301(97)90254-5"},{"key":"key2022020520153140300_b20","doi-asserted-by":"crossref","unstructured":"Kess, P., Phusavat, K. and Takala, J. (2008), \u201cManaging external knowledge: framework for organisational life cycles\u201d, International Journal of Innovation and Learning, Vol. 5 No. 3, pp. 255\u201065.","DOI":"10.1504\/IJIL.2008.017361"},{"key":"key2022020520153140300_b21","doi-asserted-by":"crossref","unstructured":"Kim, L. (1997), \u201cThe dynamics of Samsung's technological learning in semiconductors\u201d, California Management Review, Vol. 39 No. 3, pp. 86\u2010100.","DOI":"10.2307\/41165900"},{"key":"key2022020520153140300_b22","doi-asserted-by":"crossref","unstructured":"Kim, Y.G., Yu, S.H. and Lee, J.H. (2003), \u201cKnowledge strategy planning: methodology and case\u201d, Expert Systems with Applications, Vol. 24 No. 3, pp. 295\u2010307.","DOI":"10.1016\/S0957-4174(02)00158-6"},{"key":"key2022020520153140300_b23","doi-asserted-by":"crossref","unstructured":"Lagadec, P. (1997), \u201cLearning processes for crisis management in complex organizations\u201d, Journal of Contingencies and Crisis Management, Vol. 5 No. 1, pp. 24\u201031.","DOI":"10.1111\/1468-5973.00034"},{"key":"key2022020520153140300_b25","doi-asserted-by":"crossref","unstructured":"Lin, C., Liu, A.C.P., Hsu, M.L. and Wu, J.C. (2008), \u201cPursuing excellence in firm core knowledge through intelligent group decision support system\u201d, Industrial Management & Data Systems, Vol. 108 No. 3, pp. 277\u201096.","DOI":"10.1108\/02635570810858723"},{"key":"key2022020520153140300_b24","doi-asserted-by":"crossref","unstructured":"Lin, Z. (2000), \u201cOrganizational restructuring and the impact of knowledge transfer\u201d, Journal of Mathematical Sociology, Vol. 24 No. 2, pp. 129\u201049.","DOI":"10.1080\/0022250X.2000.9990232"},{"key":"key2022020520153140300_b26","unstructured":"Lofland, J. and Lofland, L.H. (1995), Analyzing Social Settings: A Guide to Qualitative Observation and Analysis, 3rd ed., Wadsworth Publishing Company, Belmont, CA."},{"key":"key2022020520153140300_b27","doi-asserted-by":"crossref","unstructured":"Masrek, M.N., Karim, N.S.A. and Hussein, R. (2008), \u201cThe effect of organizational and individual characteristics on corporate intranet utilizations\u201d, Information Management & Computer Security, Vol. 16 No. 2, pp. 89\u2010112.","DOI":"10.1108\/09685220810879591"},{"key":"key2022020520153140300_b28","doi-asserted-by":"crossref","unstructured":"Mei, Y.M., Lee, S.T. and Al\u2010Hawamdeh, S. (2004), \u201cFormulating a communication strategy for effective knowledge sharing\u201d, Journal of Information Science, Vol. 30 No. 1, pp. 12\u201022.","DOI":"10.1177\/0165551504041674"},{"key":"key2022020520153140300_b29","unstructured":"Mitroff, I.I. (1988), \u201cCrisis management: cutting through the confusion\u201d, Sloan Management Review, Vol. 29 No. 2, pp. 15\u201020."},{"key":"key2022020520153140300_b30","doi-asserted-by":"crossref","unstructured":"Mitroff, I.I. (1994), \u201cCrisis management and environmentalism: a natural fit\u201d, California Management Review, Vol. 36 No. 2, pp. 101\u201013.","DOI":"10.2307\/41165747"},{"key":"key2022020520153140300_b31","doi-asserted-by":"crossref","unstructured":"Mitroff, I.I., Alpaslan, M.C. and Green, S.E. (2004), \u201cThe FPRUM crises as ill\u2010structured messes\u201d, International Studies Review, Vol. 6 No. 1, pp. 169\u201094.","DOI":"10.1111\/j.1521-9488.2004.393_3.x"},{"key":"key2022020520153140300_b32","unstructured":"Nishiguchi, T. and Beaudet, A. (1998), \u201cCase study: the Toyota group and the Aisin fire\u201d, Sloan Management Review, Vol. 40 No. 1, pp. 49\u201059."},{"key":"key2022020520153140300_b33","doi-asserted-by":"crossref","unstructured":"Nonaka, I., Toyama, R. and Konno, N. (2000), \u201cSECI, ba and leadership: a unified model of dynamic knowledge creation\u201d, Long Range Planning, Vol. 33 No. 1, pp. 5\u201034.","DOI":"10.1016\/S0024-6301(99)00115-6"},{"key":"key2022020520153140300_b34","doi-asserted-by":"crossref","unstructured":"Pearson, C.M. and Clair, J.A. (1998), \u201cReframing crisis management\u201d, The Academy of Management Review, Vol. 23 No. 1, pp. 59\u201076.","DOI":"10.5465\/amr.1998.192960"},{"key":"key2022020520153140300_b35","doi-asserted-by":"crossref","unstructured":"Pearson, C.M. and Rondinelli, D.A. (1998), \u201cCrisis management in central European firms\u201d, Business Horizons, Vol. 41 No. 3, pp. 50\u201060.","DOI":"10.1016\/S0007-6813(98)90008-8"},{"key":"key2022020520153140300_b36","doi-asserted-by":"crossref","unstructured":"Phusavat, K. and Kess, P. (2008), \u201cRoadmap for knowledge sharing and transfer: sustaining outsourcing relationships\u201d, International Journal of Innovation and Learning, Vol. 5 No. 5, pp. 496\u2010511.","DOI":"10.1504\/IJIL.2008.018045"},{"key":"key2022020520153140300_b37","doi-asserted-by":"crossref","unstructured":"Ratnasingam, P. (2007), \u201cA risk\u2010control framework for e\u2010marketplace participation: the findings of seven cases\u201d, Information Management & Computer Security, Vol. 15 No. 2, pp. 149\u201066.","DOI":"10.1108\/09685220710748029"},{"key":"key2022020520153140300_b38","doi-asserted-by":"crossref","unstructured":"Richardson, B. (1994), \u201cSocio\u2010technical disasters: profile and prevalence\u201d, Disaster Prevention and Management, Vol. 3 No. 4, pp. 41\u201069.","DOI":"10.1108\/09653569410076766"},{"key":"key2022020520153140300_b39","doi-asserted-by":"crossref","unstructured":"Robert, B. and Lajtha, C. (2002), \u201cA new approach to crisis management\u201d, Journal of Contingencies and Crisis Management, Vol. 10 No. 4, pp. 181\u201091.","DOI":"10.1111\/1468-5973.00195"},{"key":"key2022020520153140300_b40","doi-asserted-by":"crossref","unstructured":"Sahay, B.S. and Ranjan, J. (2008), \u201cReal time business intelligence in supply chain analytics\u201d, Information Management & Computer Security, Vol. 16 No. 1, pp. 28\u201048.","DOI":"10.1108\/09685220810862733"},{"key":"key2022020520153140300_b41","doi-asserted-by":"crossref","unstructured":"Salter, J. (1997), \u201cRisk management in a disaster context\u201d, Journal of Contingencies and Crisis Management, Vol. 5 No. 1, pp. 60\u20105.","DOI":"10.1111\/1468-5973.00037"},{"key":"key2022020520153140300_b42","doi-asserted-by":"crossref","unstructured":"Shaluf, I.M., Ahmadun, F. and Said, A.M. (2003), \u201cA review of disaster and crisis\u201d, Disaster Prevention and Management, Vol. 12 No. 1, pp. 24\u201032.","DOI":"10.1108\/09653560310463829"},{"key":"key2022020520153140300_b43","doi-asserted-by":"crossref","unstructured":"Sheaffer, Z., Richardson, B. and Rosenblatt, Z. (1998), \u201cEarly\u2010warning\u2010signals management: a lesson from the Barings Crisis\u201d, Journal of Contingencies and Crisis Management, Vol. 6 No. 1, pp. 1\u201022.","DOI":"10.1111\/1468-5973.00064"},{"key":"key2022020520153140300_b44","unstructured":"Shrivastava, P. and Mitroff, I.I. (1987), \u201cStrategic management of corporate crisis\u201d, Columbia Journal of World Business, Vol. 22 No. 1, pp. 5\u201011."},{"key":"key2022020520153140300_b45","unstructured":"Simon, L. and Pauchant, T.C. (2000), \u201cDeveloping the three levels of learning in crisis management: a case study of the Hagersville tire fire\u201d, Review of Business, Vol. 21 Nos 3\/4, pp. 6\u201011."},{"key":"key2022020520153140300_b46","doi-asserted-by":"crossref","unstructured":"Smith, D. (1990), \u201cBeyond contingency planning: toward a model of crisis management\u201d, Industrial Crisis Quarterly, Vol. 4 No. 4, pp. 263\u201075.","DOI":"10.1177\/108602669000400402"},{"key":"key2022020520153140300_b47","doi-asserted-by":"crossref","unstructured":"Smith, D. (2005), \u201cBusiness (not) as usual: crisis management, service recovery and the vulnerability of organizations\u201d, Journal of Services Marketing, Vol. 19 No. 5, pp. 309\u201020.","DOI":"10.1108\/08876040510609925"},{"key":"key2022020520153140300_b48","unstructured":"Stubbart, C.I. (1987), \u201cImprove the quality of crisis thinking\u201d, Columbia Journal of World Business, Vol. 22 No. 1, pp. 89\u201099."},{"key":"key2022020520153140300_b49","doi-asserted-by":"crossref","unstructured":"Trochim, W. (1989), \u201cOutcome pattern matching and program theory\u201d, Evaluation and Program Planning, Vol. 12 No. 4, pp. 355\u201066.","DOI":"10.1016\/0149-7189(89)90052-9"},{"key":"key2022020520153140300_b50","unstructured":"Turner, B.A. and Pedgeon, N.F. (1997), Man\u2010made Disasters, 2nd ed., Butterworth\u2010Heinemann, Oxford."},{"key":"key2022020520153140300_b51","doi-asserted-by":"crossref","unstructured":"Weber, R. (2004), \u201cThe rhetoric of positivism versus interpretivism\u201d, MIS Quarterly, Vol. 28 No. 1, pp. iii\u2010xii.","DOI":"10.2307\/25148621"},{"key":"key2022020520153140300_b52","doi-asserted-by":"crossref","unstructured":"Wickramasinghe, N. (2007), \u201cFostering knowledge assets in healthcare with the KMI model\u201d, International Journal of Management and Enterprise Development, Vol. 4 No. 1, pp. 52\u201065.","DOI":"10.1504\/IJMED.2007.011455"},{"key":"key2022020520153140300_b53","unstructured":"Yin, R.K. (2003), Case Study Research: Design and Methods, 3rd ed., Sage Publications, Thousand Oaks, CA."},{"key":"key2022020520153140300_b54","doi-asserted-by":"crossref","unstructured":"Zack, M.H. (1999), \u201cDeveloping a knowledge strategy\u201d, California Management Review, Vol. 41 No. 3, pp. 125\u201045.","DOI":"10.2307\/41166000"},{"key":"key2022020520153140300_b55","doi-asserted-by":"crossref","unstructured":"Zhang, D., Zhou, L. and Nunamaker, J.F. (2002), \u201cA knowledge management framework for the support of decision making in humanitarian assistance\/disaster relief\u201d, Knowledge and Information Systems, Vol. 4 No. 3, pp. 370\u201085.","DOI":"10.1007\/s101150200012"},{"key":"key2022020520153140300_b56","doi-asserted-by":"crossref","unstructured":"Zhou, L., Vasconcelos, A. and Nunes, M. (2008), \u201cSupporting decision making in risk management through an evidence\u2010based information systems project risk checklist\u201d, Information Management & Computer Security, Vol. 16 No. 2, pp. 166\u201086.","DOI":"10.1108\/09685220810879636"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570910948605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570910948605\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570910948605\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:10Z","timestamp":1753400290000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/109\/4\/445-462\/175681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,24]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,4,24]]}},"alternative-id":["10.1108\/02635570910948605"],"URL":"https:\/\/doi.org\/10.1108\/02635570910948605","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2009,4,24]]}}}