178 research outputs found
Technology and Sociomaterial Performation
Part 1: IS/IT Implementation and AppropriationInternational audienceOrganizational researchers have acknowledged that understanding the relationship between technology and organization is crucial to understanding modern organizing and organizational change [1]. There has been a significant amount of debate concerning the theoretical foundation of this relationship. Our research draws and extends Deleuze and DeLanda’s work on assemblages and Callon’s concept of performation to investigate how different sociomaterial practices are changed and stabilized after the implementation of new technology. Our findings from an in-depth study of two ambulatory clinics within a hospital system indicate that “perform-ing” of constituting, counter-performing, calibrating, and stratifying explained the process of sociomaterial change and that this process is governed by an overarching principle of “performative exigency”. Future studies on sociomateriality and change may benefit from a deeper understanding of how sociomaterial assemblages are rendered performative
A design theory for e-service environments: The interoperability challenge
The delivery of e-services across organizational boundaries poses a number of issues in terms of design of inter-organizational systems that support service delivery effectively. In this context interoperability emerges as a mandatory requirement for the design of Information Technology (IT) platforms supporting collaborative e-service environments. In this paper we address this issue by presenting a design theory for IT platforms supporting e-services based on both a deep understanding of the interoperability concept and a design research approach. Through the analysis of a cooperation framework developed in the context of an EU funded project, we instantiate the theory by providing the concrete example of a solution addressing this design problem. © 2012 Springer-Verlag GmbH Berlin Heidelberg.The delivery of e-services across organizational boundaries poses a number of issues in terms of design of inter-organizational systems that support service delivery effectively. In this context interoperability emerges as a mandatory requirement for the design of Information Technology (IT) platforms supporting collaborative e-service environments. In this paper we address this issue by presenting a design theory for IT platforms supporting e-services based on both a deep understanding of the interoperability concept and a design research approach. Through the analysis of a cooperation framework developed in the context of an EU funded project, we instantiate the theory by providing the concrete example of a solution addressing this design problem. © 2012 Springer-Verlag GmbH Berlin Heidelberg.Monograph's chapter
Recommended from our members
Rules, Practices and Information Technology (IT): A Trifecta of Organizational Regulation
As information technology (IT) based regulation has become critical and pervasive for contemporary organizing, Information Systems research turns mostly a deaf ear to the topic. Current explanations of IT-based regulation fit into received frameworks such as structuration theory, actor-network theory, or neo-institutional analyses but fail to recognize the unique capacities IT and related IT based regulatory practices offer as a powerful regulatory means.
Any IT-based regulation system is made up of rules, practices and IT artifacts and their relationships. We propose this trifecta as a promising lens to study IT-based regulation in that it sensitizes scholars into how IT artifacts mediate rules and constitute regulatory processes embracing rules, capacities of IT endowed by the artifact, and organizational practices. We review the concepts of rules and IT-based regulation and identify two gaps in the current research on organizational regulation: 1)the critical role of sense-making as part of IT based regulation, and 2)the challenge of temporally coupling rules and their enactment during IT based regulation. To address these gaps we introduce the concept of regulatory episode as a unit of analysis for studying IT-based regulation. We also formulate a tentative research agenda for IT-based regulation that focuses on tensions triggered by the three key elements of the IT-based regulatory processes
The Norwegian eHealth Platform: Development Through Cultivation Strategies and Incremental Changes
publishedVersionNivå
The challenges of implementing packaged hospital electronic prescribing and medicine administration systems in UK hospitals: premature purchase of immature solutions?
The UK National Health Service is making major efforts to implement Hospital Electronic Prescribing and Medicine Administration (HEPMA) to improve patient safety and quality of care. Substantial public investments have attracted a wide range of UK and overseas suppliers offering Commercial-Off –The-Shelf (COTS) solutions. A lack of (UK) implementation experience and weak supplier-user relationships are reflected in systems with limited configurability, poorly matched to the needs and practices of English hospitals. This situation echoes the history of comparable corporate information infrastructures - Enterprise Resource Planning systems - in the 1980s/1990s. UK government intervention prompted a similar swarming of immature, often unfinished, products into the market. This resulted, in both cases, in protracted and difficult implementation processes as vendors and adopters struggled to get the systems to work and match the circumstances of the adopting organisations. An analysis of the influence of the Installed Base on Information Infrastructures should explore how the evolution of COTS solutions is conditioned by the structure of adopter and vendor ‘communities’
Interconnecting Governments, Businesses and Citizens – A Comparison of Two Digital Infrastructures
Part 2: Services and InteroperabilityInternational audiencePublic and private organizations in various areas are setting up digital Information Infrastructures (IIs) for interconnecting government, businesses and citizens. IIs can create value by sharing and integrating data of multiple actors. This can be the basis for value added services and especially collaborations of public and private partners can make IIs thrive. Easier access to integrated services and products (jointly) offered by government and businesses may stimulate transparency and innovations. IIs are under development in many domains, including for open data and international trade. However, there are notable differences in the design, characteristics and implementation of the IIs. The objective of this paper is to compare two diverse IIs in order to obtain a better understanding of common and differing elements in the IIs and their impact. Among the differences are the roles of government, businesses and users, in driving, developing and exploitation of the IIs
Understanding e-Government project trajectories from an actor-network perspective
A number of models have been offered to help explain the trajectories of e-Government projects: their frequent failures and their rarer successes. Most, though, lack a sense of the political interaction of stakeholders that is fundamental to understanding the public sector. This paper draws on actor-network theory to provide a perspective that is used to explain the trajectory of an e-Government case study. This perspective is found to provide a valuable insight into the local and global actor-networks that surround e-Government projects. The mobilisation, interaction and disintegration of these networks underpins the course of such projects, and can itself be understood in relation to network actor power: not through a static conception of power over others but through the dynamic-enacted concept of power to. As well as providing a research tool for analysis of e-Government project trajectories, the localglobal networks approach also offers insights into e-Government leadership as a process of network formation and maintenance; and into the tensions between network stabilisation and design stabilisation. © 2007 Operational Research Society Ltd. All rights reserved
Implementing Open Network Technologies in Complex Work Practices: A Case from Telemedicine
New non-desktop technologies may turn out to be of a more open and generic nature than traditional information technologies. These technologies consequently pose novel challenges to systems development practice, as the design, implementation, and use of these technologies will be different. This paper presents empirical material from a project where multimedia technology was introduced into a complex medical work practice (surgery). The implementation process is analyzed at the micro-level and the process is found to be highly complex, emergent, and continuous. Using actor-network theory, we argue that conceptualizing the process as cultivating the hybrid collectif of humans and non-humans, technologies and non-technologies (Callon and Law 1995) is a suitable and useful approach. This concept may capture the open-ended and emergent nature of the process and indicate the suitability of an evolutionary approach
Using Actor Network Theory to Understand Information Security Management
International audienceThis paper presents an Actor Network Theory (ANT) analysis of a computer hack at a large university. Computer hacks are usually addressed through technical means thus ensuring that perpetrators are unable to exploit system vulnerabilities. We however argue that a computer hack is a result of different events in a heterogeneous network embodying human and non-human actors. Hence a secure organizational environment is one that is characterized by 'stability' and 'social order', which is a result of negotiations and alignment of interests among different actants. The argument is conducted through a case study. Our findings reveal not only the usefulness of ANT in developing an understanding of the (in)security environment at the case study organization, but also the ability of ANT to identify differences in interests among actants. At a practical level, our analysis suggests three principles that management needs to pay attention to in order to prevent future security breaches
- …
