Usage of TB in Practice

Usage of TB in Practice

DOI: 10.4018/978-1-5225-6974-9.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter compares the universal TB model with the previous TB interpretation discussed in the first half of the book. Special attention is devoted to 19 selected TB properties ranging from adaptability to universality. Furthermore, tangible results follow in form of potential implications to business administration. Namely, information and knowledge management and information technologies are considered. In the area of information management, a generic time bank information management framework is outlined. In the scope of knowledge management, the function of TB is compared with the phenomenon known as communities of practice. Finally, co-productive behavior of the TB related to open source communities are depicted in the area of information technologies.
Chapter Preview
Top

System Characteristics: The Comparison

This sub-chapter is aimed at confronting the system characteristics of previous TB approaches with the new universal approach. By previous approaches, the original nine types described in taxonomy chapter are meant. The characteristics are listed below and for each one there is a short description.

Accessibility

Previous Approach

This TB concept is quite accessible in its essence, which proceeds from the basic idea of being a tool for people and organizations to facilitate co-production. The information about how system performs can be usually obtained two ways: either by personal experience witnessing a TB in operation and adopting a pre-existing concept, an approach which can be hardly called conceptual or systemic, or by consulting an idea for a TB with a professional in the area who can provide training and advise. The latter is a much more effective approach, but unfortunately such professionals are present only in countries where the TB concept has been strongly developed.

Universal Approach

As discovered in the breakdown of existing systems, the new system is very simple and can be included in any learning material. This would provide explicit knowledge anywhere in very vivid way, thus making it accessible and understandable even without the presence of an expert.

Adaptability

Previous Approach

Adaptation is a must within a TB. It must be able to adapt to local conditions in order to work. This adaptation may be tricky if the only information available is about one of the aforementioned approaches and if the target situation is very specific.

Universal Approach

As simple as possible, containing only the main essential elements, and can thus be adapted easily.

Affordability

This aspect is the same in both situations. Any of the TB approaches needs a coordinator. It is recommended that it be a paid position to attain sustainability, but it may also be a voluntary position, or the coordinator can earn TC for her / his work. In this sense, the approaches are similar.

Autonomy

Previous Approach

For example, P2O approaches are absolutely bound to their base organizations and cannot be autonomous and TBs are founded by an organization to fulfil its societal role. In general, any TB cannot reliably exist without a base organization and is related to its environment by various ties.

Universal Approach

It is proposed to always have a legal form, thus it is always based on an organization. Nevertheless, this organization is personification of a legal body of a TB. In other words, the organization is the TB, and, as it is stand-alone organization, it is nevertheless created from the needs of the environment and as such the TB will always be dependent on many influences.

Credibility

Previous Approach

Various models of TB have various level of credibility. In general, credibility should be assured by an adherence to rules and laws and by the presence of a coordinator as a security keeper, but there are also approaches where this element is missing.

Universal Approach

Being built on a sound methodology involving knowledge management theory as well as the implementation of all security measures from known approaches, the credibility of new approach should be considerably higher.

Complete Chapter List

Search this Book:
Reset