Skip to content

Page 17 of 18

Latest

  • Two Cheers for the Virtual Office

    Technology has made it possible to redefine where work is done. The "virtual office" offers companies and their workers many benefits: lower real estate costs, higher productivity, and increased flexibility. At the same time, organizations forfeit the benefits of the traditional office: a shared understanding of the corporate culture; a sense of loyalty; informal communication; access to people, information, and materials; and managerial control. Drawing on the results of field research, the authors discuss how firms can maximize the benefits while minimizing the losses of these alternative work arrangements. The authors identify five common arrangements: "telecommuting" refers to situations in which workers with fixed offices occasionally work at home; "hotel"-based workers come into the office frequently, reserving a cubicle where they can use the telephone and link their laptop computers to the network; the "tethered worker" has some mobility but reports to the office on a regular basis; "home" workers work entirely from a room in their homes; and "fully mobile" workers are on the road or at customer sites during the workday. Companies considering adopting virtual work must be clear about the type of virtual office that best addresses their needs and its advantages and disadvantages. If virtual work is to pay off, managers must adopt new approaches in five key areas: managing people, managing information, managing teams, managing processes, and managing facilities. Companies need to institute new information flows to replace those that are lost; educate workers on how to be more effective providers and consumers of information; provide training in virtual worker management skills and personal work strategies; and create dialogue on how to deal with changed family relationships. Effective management of alternative work arrangements means mixing virtual and nonvirtual offices. Companies should analyze the variety of approaches possible and their particular circumstances to determine just how much virtuality is appropriate.

    Learn More »
  • Core IS Capabilities for Exploiting Information Technology

    To achieve lasting competitiveness through IT, according to the authors, companies face three enduring challenges: focusing IS efforts to support business strategies and using IT innovations to develop new, superior strategies; devising and managing effective strategies for the delivery of low-cost, high-quality IS services; and choosing the technical platform on which to mount IS services. Three strands of research -- on the CIO's role and experience, the CIO's capabilities, and IS/IT outsourcing -- demonstrate that businesses need nine core IS capabilities to address these challenges: 1. Leadership. Integrating IS/IT effort with business purpose and activity. 2. Business systems thinking. Envisioning the business process that technology makes possible. 3. Relationship building. Getting the business constructively engaged in IS/IT issues. 4. Architecture planning. Creating the blueprint for a technical platform that responds to current and future business needs. 5. Making technology work. Rapidly achieving technical progress -- by one means or another. 6. Informed buying. Managing the IS/IT sourcing strategy that meets the interests of the business. 7. Contract facilitation. Ensuring the success of existing contracts for IS/IT services. 8. Contract monitoring. Protecting the business's contractual position, current and future. 9. Vendor development. Identifying the potential added value of IS/IT service suppliers. IS professionals and managers need to demonstrate a changing mix of technical, business, and interpersonal skills. The authors trace the role these skills play in achieving the core IS capabilities and discuss the challenges of adapting core IS capabilities to particular organizational contexts. Their core IS capability model implies migration to a relatively small IS function, staffed by highly able people. To sustain their ability to exploit IT, the authors conclude, organizations must make the design of flexible IS arrangements a high-priority task and take an anticipatory rather than a reactive approach to that task.

    Learn More »
  • A Credibility Equation for IT Specialists

    Successful IT specialists work on trustworthiness and good client relationships at the same time.

    Learn More »
  • Management by Maxim: How Business and IT Managers Can Create IT Infrastructures

    Creating a business-driven IT infrastructure requires that executives thoroughly understand their firm's strategic context. By formulating a series of business and IT maxims -- short simple statements of the business's positions -- they can identify the IT infrastructure service suited to their company. The authors' framework has four components: 1. Considering strategic context. What business demands, roles, and relationships are critical to infrastructure decisions? Keeping in mind the firm's strategic intent, business units may be able to coordinate and leverage some approaches across units, while keeping some autonomous and local. 2. Articulating business maxims. Using insight gained from examining the strategic context, both business and IT managers formulate business maxims and articulate agreed-on positions that they can readily understand and act on. The maxims should focus employees' attention on the firm's competitive stance, the extent of coordination across units, and the implications for information and IT management. 3. Identifying IT maxims. From the business maxims, executives identify IT maxims that describe how the firm must lead or follow in the deployment of IT in its industry, electronically process transactions, and share data across the firm and with other strategically allied companies. The maxims specify the role of IT and levels of investment relative to competitors, whether processing is tailored or standardized, and how different types of data are accessed, used, and standardized. 4. Clarifying a firm's view of IT infrastructure. A company should determine how it sees infrastructure from among four views: none, utility, dependent, and enabling. It can forgo synergies among units and not invest in infrastructure services. It can take a utility view and use the infrastructure primarily to reduce costs. With a dependent perspective, it can make investments primarily to respond to current strategies. With an enabling view, the company can overinvest in IT infrastructure to provide flexibility in responding to long-term goals. According to Broadbent and Weill, some companies may be prevented from developing clear maxims by two barriers -- expression and implementation. Managers may not understand the firm's strategic intent, executives may not have communicated strategy to operational managers, and the firm's culture may deter use of maxims. Organizational, political, cultural, and reward system issues, as well as a lack of IT leadership, may form implementation barriers.

    Learn More »
  • An Improvisational Model for Change Management: The Case of Groupware Technologies

    Each member of a jazz band embellishes and improvises on the same rhythmic structure. Similarly, a model for managing technological change recognizes the need to improvise in response to unexpected opportunities. According to Orlikowski and Hofman, traditional models, in which an organization plans for change, implements change, and tries to become stable again, no longer work in an environment that is turbulent, particularly when the technology involved can be customized. The authors propose that the changes associated with technology implementation, rather than having a beginning and an end, are ongoing. Managers cannot anticipate all the changes made during the process. Orlikowski and Hofman's alternative model recognizes three types of change. Anticipated changes occur as intended. Emergent changes arise during the process. And opportunity-based changes are introduced during the process in response to an opportunity, event, or breakdown. The three build on each other iteratively over time, much like the jazz band members improvise on the original structure of a musical composition. In a customer service department at Zeta, a large U.S. software company, the authors follow the implementation of Lotus Notes in developing a tracking system to log calls and record customers' problems. While the company anticipated some changes before introducing the technology, other changes emerged as specialists and managers began working in new ways. The department built on the anticipated and emergent changes to introduce opportunity-based changes. Zeta learned from practical experience to respond to unexpected outcomes and adapt the new technology to its needs. Not all companies are currently suited to an improvisational model. Two enabling conditions necessary are (1) alignment of the change model, the technology, and the organization and (2) resources dedicated to adapting the organization and the technology to changing conditions. Companies need to recognize the discrepancy between the way people think about technological change and the way they implement it.

    Learn More »
  • The Magic Bullet Theory in IT-Enabled Transformation

    Why do so many IT change management projects result in failure? According to Markus and Benjamin, people stay in their prescribed roles as line executives, IS specialists, and so on, with little cross-functional cooperation. People see IT as magic that can prevent them from working in old, unproductive ways. In the "magic bullet theory," there is no assigned change agent; people assume that the gun fires itself. Well-built IT makes it easier for users to work more effectively, according to the authors, but it cannot ensure that users will use it as intended. A change agent must bring together all the conditions necessary for change. Markus and Benjamin suggest that, because agents must change people's minds about IT, they frequently distance themselves from helping people to change by focusing on the power of IT rather than the reason for the change. This leads to a lack of discussion in the organization. Real issues are never confronted or resolved, which also allows users to blame the technology itself for failure rather than the change idea. And with a lack of cross-functional cooperation, line executives and IT specialists may join in resisting IT change that seems to serve different stakeholders. Markus and Benjamin examine two alternative roles for the change agent. They base the IT change facilitator model on that of an organizational development practitioner. Facilitators believe that people, not technologies, create change. They seek to bring together sound ideas, well-built IT, and organizational conditions to enable change. They seek to ensure that all people -- technologists, entrepreneurs, and users -- are empowered about IT. They remain neutral and create trust and mutual respect among functions. Companies may need to hire outside consultants to play this role, but executives and IT specialists may also be able to act as facilitators. IT change advocates focus less on empowerment and more on inspiring people to adopt a change. Rather than remaining neutral, they use any tactic to convert people -- persuasion, manipulation, communication, even "water torture" (constant but varied repetition). They know clearly what their organizations must do to use IT effectively and show people what kinds of IT they want and need. According to the authors, there are effective change advocates anywhere in an organization; they are not necessarily top managers but may be line managers or IT specialists. As a substitute for the magic bullet theory, the authors offer the metaphor of the Trojan horse, a highly coordinated effort by Greek warriors to breach the walls of Troy. Every warrior, no matter what his role, had to plan, execute, improvise, and share responsibility for the horse. In IT-enabled transformation, change is everyone's first priority; line managers, IT specialists, and other organizational members must all practice the change agent role.

    Learn More »
  • Develop Long-Term Competitiveness through IT Assets

    How can firms enhance their competitiveness through information technology? After studying IT management practices in various companies, the authors identify three assets that they see as most important to becoming and staying competitive. The human asset is an IT staff that consistently solves business problems and addresses business opportunities through information technology. IT professionals need up-to-date technical skills; an understanding of the business, which comes from client interaction; and the ability to solve problems. The technology asset -- sharable technical platforms and databases -- is essential to integrating systems and making IT applications cost effective. Firms must specify what kinds of data to share, how to store them, where to locate servers, and how to support applications and technologies. They must also establish standards that limit the range of technologies that the IT staff must support. The relationship asset implies the risk and responsibility for effectively applying IT that business and IT must share. Top management must be involved in establishing IT priorities and forming steering committees that set the tone for a cooperative IT-business relationship. Ross et al. discuss the interdependencies among the three assets, using many examples from their study. They suggest that IT and business executives should constantly assess the status of the IT assets in their firms by using the questionnaire provided. Next they should identify an action plan based on their position -- sinking, drifting, luffing, and cruising -- in relation to the competition. A firm's asset base needs to be carefully balanced; building and leveraging IT assets, according to the authors, is an organizationwide responsibility.

    Learn More »
  • Knowledge Workers and Radically New Technology

    In a study of the predictors of success and failure in implementing technology, the author examines the introduction and use of profiling, an expert system intended to aid the insurance sales process at four insurance companies. Lutheran Brotherhood, National Mutual, Prudential, and Sun Alliance tried to get more than 5,000 field salespeople to implement Profiling. The study results indicate that in implementing a radically new technology, managers need to assemble "constellations" of actions, consider the political ramifications throughout the organization, manage the momentum of the project, and work to achieve economies of scale.

    Learn More »
  • The Risks of Outsourcing IT

    Although large corporations continue to outsource it services, the issues of whether and how to outsource generate strong emotions on the part of managers. Many practitioners and academics now argue for selective or "smart" sourcing. According to this author, this is probably a sensible approach to balance efficiency and effectiveness in providing IT services. However, the author argues that companies should first ask why they should not insource IT services. His perspective is based on an analysis of eleven risks of outsourcing that he identified in discussions with both buyers and vendors in the IT outsourcing marketplace.

    Learn More »
  • The Value of Selective IT Sourcing

    Why does the outsourcing of IT frequently fail to produce the expected cost savings or other benefits? Perhaps because managers don't carefully select which IT activities to outsource. The authors examined sixty-two sourcing decisions at forty organizations through interviews with senior business executives, CIOs, consultants, and vendor account managers. From their data, they developed a set of frameworks to clarify sourcing options and aid managers in deciding which IT functions to contract out and which to retain in-house.

    Learn More »