What is knowledge process outsourcing (KPO)? - Definition from WhatIs.com


knowledge process outsourcing (KPO)

Part of the Application security glossary:

What is knowledge process outsourcing (KPO)?

Knowledge process outsourcing (KPO) is the allocation of relatively high-level tasks to an outside organization or a different group (possibly in a different geographic location) within the same organization. KPO is, essentially, high-end business process outsourcing (BPO).

Most low-level BPO jobs provide support for an organization's core competencies and entry-level prerequisites are simply a command of English (or applicable language) and basic computer skills. Knowledge process outsourcing jobs, in comparison, are typically integrated with an organization's core competencies. The jobs involve more complex tasks and may require an advanced degree and/or certification. Examples of KPO include accounting, market and legal research, Web design and content creation.

KPO and BPO are often conducted through offshore outsourcing as corporations seeking the most value for the least money source projects to countries where wages are lower. Because KPO jobs may bring in twice as much money to the economy as BPO, countries such as India are actively promoting development of that industry.

Learn More About IT:
> Wikipedia has an entry about knowledge process outsourcing (KPO).
> Physorg.com explains why outsourcing is becoming knowledge outsourcing.
> Elaine Ramos posts about KPO and other outsourcing topics in her blog.
> KPOWEB.com describes the differences between BPO and KPO.

This was last updated in January 2010
Posted by: Margaret Rouse

Related Terms


  • blacklist

    - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network. Blocked entities are typically identified as IP addresses, user... (WhatIs.com)

  • Internet Storm Center

    - The Internet Storm Center is a website provided by the SANS Institute that monitors current online security attacks and publishes information about them. The site is often referred to as an Interne... (WhatIs.com)

  • virtual machine escape

    - Virtual machine escape is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor. (WhatIs.com)


  • Application security

    - Terms related to application security, including procedural definitions for preventing software vulnerabilities and words and phrases about secure code development.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About knowledge process outsourcing (KPO)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.