Skip to content

Page 17 of 18

Latest

  • An Improvisational Model for Change Management: The Case of Groupware Technologies

    Each member of a jazz band embellishes and improvises on the same rhythmic structure. Similarly, a model for managing technological change recognizes the need to improvise in response to unexpected opportunities. According to Orlikowski and Hofman, traditional models, in which an organization plans for change, implements change, and tries to become stable again, no longer work in an environment that is turbulent, particularly when the technology involved can be customized. The authors propose that the changes associated with technology implementation, rather than having a beginning and an end, are ongoing. Managers cannot anticipate all the changes made during the process. Orlikowski and Hofman's alternative model recognizes three types of change. Anticipated changes occur as intended. Emergent changes arise during the process. And opportunity-based changes are introduced during the process in response to an opportunity, event, or breakdown. The three build on each other iteratively over time, much like the jazz band members improvise on the original structure of a musical composition. In a customer service department at Zeta, a large U.S. software company, the authors follow the implementation of Lotus Notes in developing a tracking system to log calls and record customers' problems. While the company anticipated some changes before introducing the technology, other changes emerged as specialists and managers began working in new ways. The department built on the anticipated and emergent changes to introduce opportunity-based changes. Zeta learned from practical experience to respond to unexpected outcomes and adapt the new technology to its needs. Not all companies are currently suited to an improvisational model. Two enabling conditions necessary are (1) alignment of the change model, the technology, and the organization and (2) resources dedicated to adapting the organization and the technology to changing conditions. Companies need to recognize the discrepancy between the way people think about technological change and the way they implement it.

    Learn More »
  • The Magic Bullet Theory in IT-Enabled Transformation

    Why do so many IT change management projects result in failure? According to Markus and Benjamin, people stay in their prescribed roles as line executives, IS specialists, and so on, with little cross-functional cooperation. People see IT as magic that can prevent them from working in old, unproductive ways. In the "magic bullet theory," there is no assigned change agent; people assume that the gun fires itself. Well-built IT makes it easier for users to work more effectively, according to the authors, but it cannot ensure that users will use it as intended. A change agent must bring together all the conditions necessary for change. Markus and Benjamin suggest that, because agents must change people's minds about IT, they frequently distance themselves from helping people to change by focusing on the power of IT rather than the reason for the change. This leads to a lack of discussion in the organization. Real issues are never confronted or resolved, which also allows users to blame the technology itself for failure rather than the change idea. And with a lack of cross-functional cooperation, line executives and IT specialists may join in resisting IT change that seems to serve different stakeholders. Markus and Benjamin examine two alternative roles for the change agent. They base the IT change facilitator model on that of an organizational development practitioner. Facilitators believe that people, not technologies, create change. They seek to bring together sound ideas, well-built IT, and organizational conditions to enable change. They seek to ensure that all people -- technologists, entrepreneurs, and users -- are empowered about IT. They remain neutral and create trust and mutual respect among functions. Companies may need to hire outside consultants to play this role, but executives and IT specialists may also be able to act as facilitators. IT change advocates focus less on empowerment and more on inspiring people to adopt a change. Rather than remaining neutral, they use any tactic to convert people -- persuasion, manipulation, communication, even "water torture" (constant but varied repetition). They know clearly what their organizations must do to use IT effectively and show people what kinds of IT they want and need. According to the authors, there are effective change advocates anywhere in an organization; they are not necessarily top managers but may be line managers or IT specialists. As a substitute for the magic bullet theory, the authors offer the metaphor of the Trojan horse, a highly coordinated effort by Greek warriors to breach the walls of Troy. Every warrior, no matter what his role, had to plan, execute, improvise, and share responsibility for the horse. In IT-enabled transformation, change is everyone's first priority; line managers, IT specialists, and other organizational members must all practice the change agent role.

    Learn More »
  • Develop Long-Term Competitiveness through IT Assets

    How can firms enhance their competitiveness through information technology? After studying IT management practices in various companies, the authors identify three assets that they see as most important to becoming and staying competitive. The human asset is an IT staff that consistently solves business problems and addresses business opportunities through information technology. IT professionals need up-to-date technical skills; an understanding of the business, which comes from client interaction; and the ability to solve problems. The technology asset -- sharable technical platforms and databases -- is essential to integrating systems and making IT applications cost effective. Firms must specify what kinds of data to share, how to store them, where to locate servers, and how to support applications and technologies. They must also establish standards that limit the range of technologies that the IT staff must support. The relationship asset implies the risk and responsibility for effectively applying IT that business and IT must share. Top management must be involved in establishing IT priorities and forming steering committees that set the tone for a cooperative IT-business relationship. Ross et al. discuss the interdependencies among the three assets, using many examples from their study. They suggest that IT and business executives should constantly assess the status of the IT assets in their firms by using the questionnaire provided. Next they should identify an action plan based on their position -- sinking, drifting, luffing, and cruising -- in relation to the competition. A firm's asset base needs to be carefully balanced; building and leveraging IT assets, according to the authors, is an organizationwide responsibility.

    Learn More »
  • Knowledge Workers and Radically New Technology

    In a study of the predictors of success and failure in implementing technology, the author examines the introduction and use of profiling, an expert system intended to aid the insurance sales process at four insurance companies. Lutheran Brotherhood, National Mutual, Prudential, and Sun Alliance tried to get more than 5,000 field salespeople to implement Profiling. The study results indicate that in implementing a radically new technology, managers need to assemble "constellations" of actions, consider the political ramifications throughout the organization, manage the momentum of the project, and work to achieve economies of scale.

    Learn More »
  • The Risks of Outsourcing IT

    Although large corporations continue to outsource it services, the issues of whether and how to outsource generate strong emotions on the part of managers. Many practitioners and academics now argue for selective or "smart" sourcing. According to this author, this is probably a sensible approach to balance efficiency and effectiveness in providing IT services. However, the author argues that companies should first ask why they should not insource IT services. His perspective is based on an analysis of eleven risks of outsourcing that he identified in discussions with both buyers and vendors in the IT outsourcing marketplace.

    Learn More »
  • The Value of Selective IT Sourcing

    Why does the outsourcing of IT frequently fail to produce the expected cost savings or other benefits? Perhaps because managers don't carefully select which IT activities to outsource. The authors examined sixty-two sourcing decisions at forty organizations through interviews with senior business executives, CIOs, consultants, and vendor account managers. From their data, they developed a set of frameworks to clarify sourcing options and aid managers in deciding which IT functions to contract out and which to retain in-house.

    Learn More »
  • Will the Internet Revolutionize Business Education and Research?

    The international data highway will transform business education, although not necessarily its traditional supplier, the business school. Will the business school remain insulated from the knowledge revolution? Will it play a leadership role? Will it wither away? Two scenarios, one based on assumptions about education and the other on assumptions about research, are intended to help business schools and their stakeholders recognize the inevitability of change and envision what this new world might look like.

    Learn More »
  • Improve Software Quality by Reusing Knowledge and Experience

    The approaches for improving quality in manufacturing processes don't work especially well for software development. The authors provide a quality improvement paradigm for the software industry that builds on manufacturing models but focuses on reused learning and experience by establishing "experience factories." Their iterative process enables an organization to acquire core competencies to support its strategic capabilities.

    Learn More »
  • Hurdle the Cross-Functional Barriers to Strategic Change

    Learn More »
  • Electronic Markets and Virtual Value Chains on the Information Superhighway

    How will future traffic on the information superhighway affect each segment of an industry value chain? Will electronic markets provide new areas of opportunity for retailers, producers, and consumers as well? The authors suggest that the NII, or national infrastructure, will give consumers increased access to a vast selection of goods but will cause a restructuring and redistribution of profits among the stakeholders along the chain. There will also be an evolution from single-source sales channels to electronic markets. And electronic markets may lower coordination costs for producers and retailers, lower physical distribution costs, or eliminate retailers and wholesalers entirely, as consumers directly access manufacturers. Consumers' full access to the market will also be an issue that policymakers need to explore.

    Learn More »