Skip to main content
Log in

When the river leaves its bed: analyzing deviations between planned and actual interaction structures in IT change processes

  • Research Article
  • Published:
Journal of Information Technology

Abstract

There is ample evidence of deviations between the actual and planned interaction structures between a firm’s IT department and business units. Such deviations can hinder senior managers from governing their IT organizations effectively because they do not know how work really gets done. This paper develops an explanation for why actual structures differ from planned structures. Understanding this phenomenon is indispensable for managers to govern the real organization, to uphold compliance with important standards (e.g., ITIL, COBIT), to decide whether the formal or the actual organization is more effective, and, finally, to identify management actions that support the optimal structure. To develop this understanding, we analyze the interaction structures at the interface between firms’ business units and IT units in four rich cases, using data from 56 interviews and 47 questionnaires, and applying qualitative methods and social network analysis, which give us deep insights into planned and actual interaction among employees. We test two different explanations for deviations of actual from planned interaction structures and find that boundary-spanning theory provides the dominant explanation for such deviations: Inclined to span the business/IT boundary most effectively, the actors involved deviate from planned structures especially when other structures offer better boundary-spanning potential, which is influenced primarily by cross-domain knowledge. In addition, relationships also play an important role. On the positive side, relationships provide opportunities for such deviations, while on the negative side, a conflict-laden relationship might hinder deviations even if they were advantageous.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11

Similar content being viewed by others

Notes

  1. IT Infrastructure Library (OGC, 2007).

  2. Control Objectives for Information and Related Technology (ISACA, 2012).

  3. In the IT domain, an analogous trend can be seen in the increasing presence of shadow IT (Williams, 2011), which is caused to a substantial degree by the need for higher agility of business units and appears – to a sometimes threatening degree – despite higher levels of formal transparency and compliance.

  4. The IT organization is generally not strongly influenced by industry specifics (Tiwana and Konsynski, 2010), and for the IT change process, ITIL v3 proposes a ‘guidance that is scalable for different kinds and sizes of organizations’ (OGC, 2007: 42).

  5. More details about the approach are provided in Appendix C.

  6. See Appendix D for details regarding the calculation of betweenness centrality and the determination of a comparable evaluation of the planned structure.

  7. Since the majority of interviews was conducted in German, quotes from these interviews were translated by the first author and translations were verified by the second author.

  8. Non-translated statement from interview conducted in English.

  9. We thank one of the anonymous reviewers for the valuable advice to consider the findings of Nonaka (1994) to explain the importance of cross-domain knowledge and to better understand the creation of organizational knowledge in our context.

  10. Note that in the case of ThatBank we conducted additional interviews for the incident management process and our observations strongly support this theoretical transfer of arguments.

  11. 11. Depending on the organizational setup.

References

  • Agarwal, R. and Sambamurthy, V. (2002). Principles and Models for Organizing the IT Function, MIS Quarterly Executive 1 (1): 1–16.

    Google Scholar 

  • Ahuja, G., Soda, G. and Zaheer, A. (2012). The Genesis and Dynamics of Organizational Networks, Organization Science 23 (2): 434–448.

    Article  Google Scholar 

  • Albrecht, S.L. and Goldman, P. (1985). Men, Women, and Informal Organization in Manufacturing, Sociological Focus 18 (4): 279–288.

    Google Scholar 

  • Auerbach, C.F. and Silverstein, L.B. (2003). Qualitative Data: An introduction to coding and analyzing, New York, London: New York University Press.

    Google Scholar 

  • Bassellier, G. and Benbasat, I. (2004). Business Competence of Information Technology Professionals: Conceptual development on IT-business partnerships, MIS Quarterly 28 (4): 673–694.

    Google Scholar 

  • Benbasat, I., Goldstein, D. and Mead, M. (1987). The Case Research Strategy in Studies of Information Systems, MIS Quarterly 11 (3): 369–386.

    Article  Google Scholar 

  • Bouty, I. (2000). Interpersonal and Interaction Influences on Informal Resource Exchanges between R&D Researchers across Organizational Boundaries, Academy of Management Journal 43 (1): 50–65.

    Article  Google Scholar 

  • Bycio, P. and Allen, J.S. (2004). A Critical Incidents Approach to Outcomes Assessment, Journal of Education for Business 80 (2): 86–92.

    Article  Google Scholar 

  • Carlile, P.R. (2002). A Pragmatic View of Knowledge and Boundaries: Boundary objects in new product development, Organization Science 13 (4): 442–455.

    Article  Google Scholar 

  • Chan, Y.E. (2002). Why Haven’t We Mastered Alignment? The importance of the informal organization structure, MIS Quarterly Executive 1 (2): 97–112.

    Google Scholar 

  • Chan, Y.E. and Reich, B.H. (2007). IT Alignment: What have we learned? Journal of Information Technology 22 (4): 297–315.

    Article  Google Scholar 

  • Cobb, A.T. (1980). Informal Influence in the Formal Organization: Perceived sources of power among work unit peers, Academy of Management Journal 23 (1): 155–161.

    Article  Google Scholar 

  • Cross, R.L., Parker, A., Prusak, L. and Borgatti, S.P. (2001). Knowing What We Know: Supporting knowledge creation and sharing in social networks, Organizational Dynamics 30 (2): 100–120.

    Article  Google Scholar 

  • Curtis, B., Krasner, H. and Iscoe, N. (1988). A Field Study of the Software Design Process for Large Systems, Communications of the ACM 31 (11): 1268–1287.

    Article  Google Scholar 

  • Dahl, M.S. and Pedersen, C.Ø. (2004). Knowledge Flows through Informal Contacts in Industrial Clusters: Myth or reality? Research Policy 33 (10): 1673–1686.

    Article  Google Scholar 

  • Dubé, L. and Paré, G. (2003). Rigor in Information Systems Positivist Case Research: Current practices, trends, and recommendations, MIS Quarterly 27 (4): 597–636.

    Google Scholar 

  • Eisenhardt, K.M. (1989). Building Theories from Case Study Research, Academy of Management Review 14 (4): 532–550.

    Google Scholar 

  • Everett, M.G. and Borgatti, S.P. (1999). The Centrality of Groups and Classes, Journal of Mathematical Sociology 23 (3): 181–201.

    Article  Google Scholar 

  • Farmer, N. (2008). The Invisible Organization: How informal networks can lead organizational change, Farnham, England, Burlington, VT: Gower.

    Google Scholar 

  • Feeny, D.F. and Willcocks, L.P. (1998). Core IS Capabilities for Exploiting Information Technology, Sloan Management Review 39 (3): 9–21.

    Google Scholar 

  • Flanagan, J.C. (1954). The Critical Incident Technique, Psychological Bulletin 51 (4): 327–358.

    Article  Google Scholar 

  • Gasson, S. (2006). A Genealogical Study of Boundary-Spanning IS Design, European Journal of Information Systems 15 (1): 26–41.

    Article  Google Scholar 

  • Goldsmith, M. and Katzenbach, J. (2007). Navigating the ‘Informal’ Organization. BusinessWeek 14 February. [WWW document] http://www.businessweek.com/stories/2007-02-14/navigating-the-informal-organizationbusinessweek-business-news-stock-market-and-financial-advice, (accessed 15 March 2013).

  • Granovetter, M.S. (1973). The Strength of Weak Ties, American Journal of Sociology 78 (6): 1360–1380.

    Article  Google Scholar 

  • Granovetter, M.S. (1985). Economic Action and Social Structure: The problem of embeddedness, American Journal of Sociology 91 (3): 481–510.

    Article  Google Scholar 

  • Gulati, R. and Puranam, P. (2009). Renewal Through Reorganization: The value of inconsistencies between formal and informal organization, Organization Science 20 (2): 422–440.

    Article  Google Scholar 

  • H.R. 3763–107th Congress: Sarbanes-Oxley Act of 2002 (2002). [WWW document] www.GovTrack.us; http://www.govtrack.us/congress/bills/107/hr3763, (accessed 23 February 2013).

  • ISACA (2012). CobiT 5. A Business Framework for the Governance and Management of Enterprise IT.

  • Johanson, J.-E. (2000). Formal Structure and Intra-Organisational Networks: An analysis in a combined social and health organisation in Finland, Scandinavian Journal of Management 16 (3): 249–267.

    Article  Google Scholar 

  • Johnson, J.D., Donohue, W.A., Atkin, C.K. and Johnson, S. (1994). Differences between Formal and Informal Communication Channels, Journal of Business Communication 31 (2): 111–122.

    Article  Google Scholar 

  • Kleinbaum, A.M. (2012). Organizational Misfits and the Origins of Brokerage in Intrafirm Networks, Administrative Science Quarterly 57 (3): 407–452.

    Article  Google Scholar 

  • Krackhardt, D. and Hanson, J.R. (1993). Informal Networks: The company behind the chart, Harvard Business Review 71 (4): 104–111.

    Google Scholar 

  • Krauss, R. and Fussell, S. (1990). Mutual Knowledge and Communicative Effectiveness, in J. Galegher, R.E. Kraut and C. Egido (eds.) Intellectual Teamwork: Social and technological foundations of cooperative work, Hillsdale: Lawrence Erlbaum Associates, pp. 111–146.

    Google Scholar 

  • Lee, A.S. and Baskerville, R. (2003). Generalizing Generalizability in Information Systems Research, Information Systems Research 14 (3): 221–243.

    Article  Google Scholar 

  • Levina, N. and Vaast, E. (2005). The Emergence of Boundary Spanning Competence in Practice: Implications for implementation and use of information systems, MIS Quarterly 29 (2): 335–363.

    Google Scholar 

  • Levina, N. and Vaast, E. (2006). Turning a Community into a Market: A practice perspective on information technology use in boundary spanning, Journal of Management Information Systems 22 (4): 13–37.

    Article  Google Scholar 

  • Markus, M.L. (1983). Power, Politics, and MIS Implementation, Communications of the ACM 26 (6): 430–444.

    Article  Google Scholar 

  • McConkie, M.L. and Boss, R.W. (1986). Organizational Stories: One means of moving the informal organization during change efforts, Public Administration Quarterly 10 (2): 189–205.

    Google Scholar 

  • Meyer, J.W. and Rowan, B. (1977). Institutionalized Organizations: Formal structure as myth and ceremony, American Journal of Sociology 83 (2): 340–363.

    Article  Google Scholar 

  • Mintzberg, H. (1973). The Nature of Managerial Work, New York: Harper & Row.

    Google Scholar 

  • Nahapiet, J. and Ghoshal, S. (1998). Social Capital, Intellectual Capital, and the Organizational Advantage, Academy of Management Review 23 (2): 242–266.

    Google Scholar 

  • Nickerson, J. and Zenger, T. (2002). Being Efficiently Fickle: A dynamic theory of organizational choice, Organization Science 13 (5): 547–566.

    Article  Google Scholar 

  • Nochur, K. and Allen, T.J. (1992). Do Nominated Boundary Spanners Become Effective Technological Gatekeepers? IEEE Transactions on Engineering Management 39 (3): 265–269.

    Article  Google Scholar 

  • Nonaka, I. (1994). A Dynamic Theory of Organizational Knowledge Creation, Organization Science 5 (1): 14–37.

    Article  Google Scholar 

  • OGC (2007). ITIL Service Operations, Norwich, UK: TSO (The Stationary Office).

  • Orlikowski, W.J. (2002). Knowing in Practice: Enacting a collective capability in distributed organizing, Organization Science 13 (3): 249–273.

    Article  Google Scholar 

  • Preston, D.S. and Karahanna, E. (2009). Antecedents of IS Strategic Alignment: A nomological network, Information Systems Research 20 (2): 159–179.

    Article  Google Scholar 

  • Reich, B.H. and Benbasat, I. (2000). Factors that Influence the Social Dimension of Alignment between Business and Information Technology Objectives, MIS Quarterly 24 (1): 81–113.

    Article  Google Scholar 

  • Reingold, J. and Yang, J.L. (2007). The Hidden Workplace. Fortune 18 July. [WWW document] http://money.cnn.com/magazines/fortune/fortune_archive/2007/07/23/100135706/index2.htm, (accessed 15 March 2013).

  • Remøe, S.O. (1982). Informal Organization and Status Inequality: A sociological view of social relations in north sea oil production, Acta Sociologica 25 (1S): 15–24.

    Google Scholar 

  • Reynolds, T.J. and Gutman, J. (1988). Laddering Theory, Method, Analysis, and Interpretation, Journal of Advertising Research 28 (1): 11–31.

    Google Scholar 

  • Rockart, J.F., Earl, M.J. and Ross, J.W. (1996). Eight Imperatives for the New IT Organization, Sloan Management Review 38 (1): 43–55.

    Google Scholar 

  • Roethlisberger, F. and Dickson, W. (1939). Management and the Worker: An account of a research program conducted by the western electric company, hawthorne works, Chicago, Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Rugg, G. and McGeorge, P. (1995). Laddering, Expert Systems 12 (4): 339–346.

    Article  Google Scholar 

  • Rugg, G., Eva, M., Mahmood, A., Rehman, N., Andrews, S. and Davies, S. (2002). Eliciting Information about Organizational Culture Via Laddering, Information Systems Journal 12 (3): 215–229.

    Article  Google Scholar 

  • Saldaña, J. (2011). The Coding Manual for Qualitative Researchers, Los Angeles: Sage Publications.

    Google Scholar 

  • Santarelli, E. and Sterlacchini, A. (1990). Innovation, Formal vs. Informal R&D, and Firm Size: Some evidence from Italian manufacturing firms, Small Business Economics 2 (3): 223–228.

    Article  Google Scholar 

  • Schwarz, A. and Hirschheim, R. (2003). An Extended Platform Logic Perspective of IT Governance: Managing perceptions and activities of IT, Journal of Strategic Information Systems 12 (2): 129–166.

    Article  Google Scholar 

  • Schultze, U. and Avital, M. (2011). Designing Interviews to Generate Rich Data for Information Systems Research, Information and Organization 21 (1): 1–16.

    Article  Google Scholar 

  • Seddon, P.B., Calvert, C. and Yang, S. (2010). A Multi-Project Model of Key Factors Affecting Organizational Benefits from Enterprise Systems, MIS Quarterly 34 (2): 305–328.

    Google Scholar 

  • Soda, G. and Zaheer, A. (2012). A Network Perspective on Organizational Architecture: Performance effects of the interplay of formal and informal organization, Strategic Management Journal 33 (6): 751–771.

    Article  Google Scholar 

  • Star, S.L. and Griesemer, J.R. (1989). Institutional Ecology, ‘Translations’ and Boundary Objects: Amateurs and professionals in Berkeley’s museum of vertebrate zoology, 1907-39, Social Studies of Science 19 (3): 387–420.

    Article  Google Scholar 

  • Strauss, G. (1962). Tactics of Lateral Relationship: The purchasing agent, Administrative Science Quarterly 7 (2): 161–186.

    Article  Google Scholar 

  • Tiwana, A. and Konsynski, B. (2010). Complementarities between Organizational IT Architecture and Governance Structure, Information Systems Research 21 (2): 288–304.

    Article  Google Scholar 

  • Tushman, M.L. (1977). Special Boundary Roles in the Innovation Process, Administrative Science Quarterly 22 (4): 587–605.

    Article  Google Scholar 

  • Uzzi, B. (1997). Social Structure and Competition in Interfirm Networks: The paradox of embeddedness, Administrative Science Quarterly 42 (1): 35–67.

    Article  Google Scholar 

  • Uzzi, B. (1999). Embeddedness in the Making of Financial Capital: How social relations and networks benefit firms seeking financing, American Sociological Review 64 (4): 481–505.

    Article  Google Scholar 

  • Uzzi, B. and Gillespie, J. (2002). Knowledge Spillover in Corporate Financing Networks: Embeddedness and the firm’s debt performance, Strategic Management Journal 23 (7): 595–618.

    Article  Google Scholar 

  • Wasserman, S. and Faust, K. (2007). Social Network Analysis: Methods and applications, Cambridge: Cambridge University Press.

    Google Scholar 

  • Williams, J. (2011). Experts warn of growth of ‘shadow IT’ use outside IT department control. Computer Weekly 20 June 2011. [WWW document] http://www.computerweekly.com/news/2240104901/Experts-warn-of-growth-of-shadow-IT-use-outside-IT-department-control, (accessed 25 March 2013).

  • Yin, R.K. (2009). Case Study Research: Design and methods, Thousand Oaks: Sage Publications.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Appendices

Appendix A

Questionnaire about actual interaction structures

1. Please indicate employees from the business unit with whom you interact a lot in the context of the IT change process for System XY and describe how and how often you interact with them.

illustration

figure a

2. Please indicate employees from the IT unit with whom you interact a lot in the context of the IT change process for System XY and describe how and how often you interact with them.

<answered within the same type of table as question 1>

3. Please indicate employees from the liaison unit with whom you interact a lot in the context of the IT change process for System XY and describe how and how often you interact with them.

<answered within the same type of table as question 1>

Appendix B

Guiding questions for main stage interviews

  • Background of interviewee:

    • ° What is your background?

    • ° Do you have cross-domain experience?

    • ° What is your role in the IT change process?

  • Change process (preferably with regard to a particular example):

    • ° How are (critical) changes handled? Especially, regarding the interaction of involved units?

    • ° How are regular changes handled?

    • ° Is that – in the eyes of the interviewee – congruent with the formal definition of this process?

    • ° If it is only congruent in the eyes of the interviewee but not in the eyes of the interviewer: Interviewer should highlight elements that are different and the interviewee should comment on them.

    • ° If the actual and the process perceived by the interviewee differ: Why the interviewee does not follow the prescribed process? How does this deviation help? (Applying laddering as described in the data collection section and Appendix C).

    • ° What is the key success factor of the actual interaction structure (no matter whether or not it mirrored the planned interaction structure)?

    • ° What would the interviewee change in the interaction structure if he or she could? How would he or she develop interaction structure on a green field? Why?

Appendix C

Using critical incident technique and laddering

Motivated by the fact that critical incidents can be more accurately recalled and described than average behavior (Flanagan, 1954) and significantly impact the success of the process being studied (Bycio and Allen, 2004), we asked interviewees to describe a recent change that was either handled very positively or very negatively, identifying critical incidents. Focusing on such critical situations, we asked the interviewees for factors that were most important for the eventual deviation of actual from planned interaction structures in these situations and applied the interviewing technique used in laddering to understand the connection between this aspect and the potential deviation of interaction structures in more detail. This technique allowed us to investigate answers more systematically (Rugg and McGeorge, 1995). Questions like: ‘Why didn’t you follow the planned interaction structures?’ or ‘Why in particular did this aspect influence your choice of interaction?’ were used to probe upward, respectively, downward the ‘ladder’ of means (drivers) that lead to certain ends (deviation of actual interaction structures) (Reynolds and Gutman, 1988; Rugg and McGeorge, 1995). We also asked the interviewees to describe the regular IT change process, that is, the one they actually followed for regular changes, and compared it with the planned one in a similar fashion.

Appendix D

Calculation of deviation measure

The betweenness of a group, such as a liaison unit, is calculated as the percentage of shortest paths between non-group members of which group members are part (Everett and Borgatti, 1999). Using the survey data, we derived a communication network covering involved people in the business unit, IT unit, and liaison unit. In this network, a tie between two actors means they interact at least once per week in meetings or via phone. Since we are only interested in communication between business and IT (i.e., not the shortest paths within the business unit or within the IT unit), we developed an adapted measure based on the group betweenness measure proposed by Everett and Borgatti (1999):

  • Calculation of shortest paths lengths between any pair of business and IT actors;

  • Elimination of all liaison actors;

  • Recalculation of shortest paths lengths;

  • Count of pairs of actors between which the second length is longer or who have become disconnected when eliminating the liaison actors, that is, the pairs of actors whose shortest paths involve at least one liaison person, making the liaison person part of the most probable path along which business and IT exchange information;

  • Division by the sum of connected pairs in the original network (before the elimination).

The betweenness centrality value for the planned structure was determined as follows:

  • 100% when the liaison person or unit was supposed to fully channel communication;

  • 0% when trilateral meetings were an integral part of interaction structures;

  • 50% when the liaison unit or person should be the primary contact, yet trilateral meetings or clarifying meetings without the liaison unit or person were part of the planned structure.

This approach led to the deviation values shown in Table D1.

Table D1 Calculation of deviation

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zolper, K., Beimborn, D. & Weitzel, T. When the river leaves its bed: analyzing deviations between planned and actual interaction structures in IT change processes. J Inf Technol 28, 333–353 (2013). https://doi.org/10.1057/jit.2013.23

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/jit.2013.23

Keywords

Navigation