Abstract
There is ample evidence of deviations between the actual and planned interaction structures between a firm’s IT department and business units. Such deviations can hinder senior managers from governing their IT organizations effectively because they do not know how work really gets done. This paper develops an explanation for why actual structures differ from planned structures. Understanding this phenomenon is indispensable for managers to govern the real organization, to uphold compliance with important standards (e.g., ITIL, COBIT), to decide whether the formal or the actual organization is more effective, and, finally, to identify management actions that support the optimal structure. To develop this understanding, we analyze the interaction structures at the interface between firms’ business units and IT units in four rich cases, using data from 56 interviews and 47 questionnaires, and applying qualitative methods and social network analysis, which give us deep insights into planned and actual interaction among employees. We test two different explanations for deviations of actual from planned interaction structures and find that boundary-spanning theory provides the dominant explanation for such deviations: Inclined to span the business/IT boundary most effectively, the actors involved deviate from planned structures especially when other structures offer better boundary-spanning potential, which is influenced primarily by cross-domain knowledge. In addition, relationships also play an important role. On the positive side, relationships provide opportunities for such deviations, while on the negative side, a conflict-laden relationship might hinder deviations even if they were advantageous.
Similar content being viewed by others
Notes
IT Infrastructure Library (OGC, 2007).
Control Objectives for Information and Related Technology (ISACA, 2012).
In the IT domain, an analogous trend can be seen in the increasing presence of shadow IT (Williams, 2011), which is caused to a substantial degree by the need for higher agility of business units and appears – to a sometimes threatening degree – despite higher levels of formal transparency and compliance.
The IT organization is generally not strongly influenced by industry specifics (Tiwana and Konsynski, 2010), and for the IT change process, ITIL v3 proposes a ‘guidance that is scalable for different kinds and sizes of organizations’ (OGC, 2007: 42).
More details about the approach are provided in Appendix C.
See Appendix D for details regarding the calculation of betweenness centrality and the determination of a comparable evaluation of the planned structure.
Since the majority of interviews was conducted in German, quotes from these interviews were translated by the first author and translations were verified by the second author.
Non-translated statement from interview conducted in English.
We thank one of the anonymous reviewers for the valuable advice to consider the findings of Nonaka (1994) to explain the importance of cross-domain knowledge and to better understand the creation of organizational knowledge in our context.
Note that in the case of ThatBank we conducted additional interviews for the incident management process and our observations strongly support this theoretical transfer of arguments.
11. Depending on the organizational setup.
References
Agarwal, R. and Sambamurthy, V. (2002). Principles and Models for Organizing the IT Function, MIS Quarterly Executive 1 (1): 1–16.
Ahuja, G., Soda, G. and Zaheer, A. (2012). The Genesis and Dynamics of Organizational Networks, Organization Science 23 (2): 434–448.
Albrecht, S.L. and Goldman, P. (1985). Men, Women, and Informal Organization in Manufacturing, Sociological Focus 18 (4): 279–288.
Auerbach, C.F. and Silverstein, L.B. (2003). Qualitative Data: An introduction to coding and analyzing, New York, London: New York University Press.
Bassellier, G. and Benbasat, I. (2004). Business Competence of Information Technology Professionals: Conceptual development on IT-business partnerships, MIS Quarterly 28 (4): 673–694.
Benbasat, I., Goldstein, D. and Mead, M. (1987). The Case Research Strategy in Studies of Information Systems, MIS Quarterly 11 (3): 369–386.
Bouty, I. (2000). Interpersonal and Interaction Influences on Informal Resource Exchanges between R&D Researchers across Organizational Boundaries, Academy of Management Journal 43 (1): 50–65.
Bycio, P. and Allen, J.S. (2004). A Critical Incidents Approach to Outcomes Assessment, Journal of Education for Business 80 (2): 86–92.
Carlile, P.R. (2002). A Pragmatic View of Knowledge and Boundaries: Boundary objects in new product development, Organization Science 13 (4): 442–455.
Chan, Y.E. (2002). Why Haven’t We Mastered Alignment? The importance of the informal organization structure, MIS Quarterly Executive 1 (2): 97–112.
Chan, Y.E. and Reich, B.H. (2007). IT Alignment: What have we learned? Journal of Information Technology 22 (4): 297–315.
Cobb, A.T. (1980). Informal Influence in the Formal Organization: Perceived sources of power among work unit peers, Academy of Management Journal 23 (1): 155–161.
Cross, R.L., Parker, A., Prusak, L. and Borgatti, S.P. (2001). Knowing What We Know: Supporting knowledge creation and sharing in social networks, Organizational Dynamics 30 (2): 100–120.
Curtis, B., Krasner, H. and Iscoe, N. (1988). A Field Study of the Software Design Process for Large Systems, Communications of the ACM 31 (11): 1268–1287.
Dahl, M.S. and Pedersen, C.Ø. (2004). Knowledge Flows through Informal Contacts in Industrial Clusters: Myth or reality? Research Policy 33 (10): 1673–1686.
Dubé, L. and Paré, G. (2003). Rigor in Information Systems Positivist Case Research: Current practices, trends, and recommendations, MIS Quarterly 27 (4): 597–636.
Eisenhardt, K.M. (1989). Building Theories from Case Study Research, Academy of Management Review 14 (4): 532–550.
Everett, M.G. and Borgatti, S.P. (1999). The Centrality of Groups and Classes, Journal of Mathematical Sociology 23 (3): 181–201.
Farmer, N. (2008). The Invisible Organization: How informal networks can lead organizational change, Farnham, England, Burlington, VT: Gower.
Feeny, D.F. and Willcocks, L.P. (1998). Core IS Capabilities for Exploiting Information Technology, Sloan Management Review 39 (3): 9–21.
Flanagan, J.C. (1954). The Critical Incident Technique, Psychological Bulletin 51 (4): 327–358.
Gasson, S. (2006). A Genealogical Study of Boundary-Spanning IS Design, European Journal of Information Systems 15 (1): 26–41.
Goldsmith, M. and Katzenbach, J. (2007). Navigating the ‘Informal’ Organization. BusinessWeek 14 February. [WWW document] http://www.businessweek.com/stories/2007-02-14/navigating-the-informal-organizationbusinessweek-business-news-stock-market-and-financial-advice, (accessed 15 March 2013).
Granovetter, M.S. (1973). The Strength of Weak Ties, American Journal of Sociology 78 (6): 1360–1380.
Granovetter, M.S. (1985). Economic Action and Social Structure: The problem of embeddedness, American Journal of Sociology 91 (3): 481–510.
Gulati, R. and Puranam, P. (2009). Renewal Through Reorganization: The value of inconsistencies between formal and informal organization, Organization Science 20 (2): 422–440.
H.R. 3763–107th Congress: Sarbanes-Oxley Act of 2002 (2002). [WWW document] www.GovTrack.us; http://www.govtrack.us/congress/bills/107/hr3763, (accessed 23 February 2013).
ISACA (2012). CobiT 5. A Business Framework for the Governance and Management of Enterprise IT.
Johanson, J.-E. (2000). Formal Structure and Intra-Organisational Networks: An analysis in a combined social and health organisation in Finland, Scandinavian Journal of Management 16 (3): 249–267.
Johnson, J.D., Donohue, W.A., Atkin, C.K. and Johnson, S. (1994). Differences between Formal and Informal Communication Channels, Journal of Business Communication 31 (2): 111–122.
Kleinbaum, A.M. (2012). Organizational Misfits and the Origins of Brokerage in Intrafirm Networks, Administrative Science Quarterly 57 (3): 407–452.
Krackhardt, D. and Hanson, J.R. (1993). Informal Networks: The company behind the chart, Harvard Business Review 71 (4): 104–111.
Krauss, R. and Fussell, S. (1990). Mutual Knowledge and Communicative Effectiveness, in J. Galegher, R.E. Kraut and C. Egido (eds.) Intellectual Teamwork: Social and technological foundations of cooperative work, Hillsdale: Lawrence Erlbaum Associates, pp. 111–146.
Lee, A.S. and Baskerville, R. (2003). Generalizing Generalizability in Information Systems Research, Information Systems Research 14 (3): 221–243.
Levina, N. and Vaast, E. (2005). The Emergence of Boundary Spanning Competence in Practice: Implications for implementation and use of information systems, MIS Quarterly 29 (2): 335–363.
Levina, N. and Vaast, E. (2006). Turning a Community into a Market: A practice perspective on information technology use in boundary spanning, Journal of Management Information Systems 22 (4): 13–37.
Markus, M.L. (1983). Power, Politics, and MIS Implementation, Communications of the ACM 26 (6): 430–444.
McConkie, M.L. and Boss, R.W. (1986). Organizational Stories: One means of moving the informal organization during change efforts, Public Administration Quarterly 10 (2): 189–205.
Meyer, J.W. and Rowan, B. (1977). Institutionalized Organizations: Formal structure as myth and ceremony, American Journal of Sociology 83 (2): 340–363.
Mintzberg, H. (1973). The Nature of Managerial Work, New York: Harper & Row.
Nahapiet, J. and Ghoshal, S. (1998). Social Capital, Intellectual Capital, and the Organizational Advantage, Academy of Management Review 23 (2): 242–266.
Nickerson, J. and Zenger, T. (2002). Being Efficiently Fickle: A dynamic theory of organizational choice, Organization Science 13 (5): 547–566.
Nochur, K. and Allen, T.J. (1992). Do Nominated Boundary Spanners Become Effective Technological Gatekeepers? IEEE Transactions on Engineering Management 39 (3): 265–269.
Nonaka, I. (1994). A Dynamic Theory of Organizational Knowledge Creation, Organization Science 5 (1): 14–37.
OGC (2007). ITIL Service Operations, Norwich, UK: TSO (The Stationary Office).
Orlikowski, W.J. (2002). Knowing in Practice: Enacting a collective capability in distributed organizing, Organization Science 13 (3): 249–273.
Preston, D.S. and Karahanna, E. (2009). Antecedents of IS Strategic Alignment: A nomological network, Information Systems Research 20 (2): 159–179.
Reich, B.H. and Benbasat, I. (2000). Factors that Influence the Social Dimension of Alignment between Business and Information Technology Objectives, MIS Quarterly 24 (1): 81–113.
Reingold, J. and Yang, J.L. (2007). The Hidden Workplace. Fortune 18 July. [WWW document] http://money.cnn.com/magazines/fortune/fortune_archive/2007/07/23/100135706/index2.htm, (accessed 15 March 2013).
Remøe, S.O. (1982). Informal Organization and Status Inequality: A sociological view of social relations in north sea oil production, Acta Sociologica 25 (1S): 15–24.
Reynolds, T.J. and Gutman, J. (1988). Laddering Theory, Method, Analysis, and Interpretation, Journal of Advertising Research 28 (1): 11–31.
Rockart, J.F., Earl, M.J. and Ross, J.W. (1996). Eight Imperatives for the New IT Organization, Sloan Management Review 38 (1): 43–55.
Roethlisberger, F. and Dickson, W. (1939). Management and the Worker: An account of a research program conducted by the western electric company, hawthorne works, Chicago, Cambridge, MA: Harvard University Press.
Rugg, G. and McGeorge, P. (1995). Laddering, Expert Systems 12 (4): 339–346.
Rugg, G., Eva, M., Mahmood, A., Rehman, N., Andrews, S. and Davies, S. (2002). Eliciting Information about Organizational Culture Via Laddering, Information Systems Journal 12 (3): 215–229.
Saldaña, J. (2011). The Coding Manual for Qualitative Researchers, Los Angeles: Sage Publications.
Santarelli, E. and Sterlacchini, A. (1990). Innovation, Formal vs. Informal R&D, and Firm Size: Some evidence from Italian manufacturing firms, Small Business Economics 2 (3): 223–228.
Schwarz, A. and Hirschheim, R. (2003). An Extended Platform Logic Perspective of IT Governance: Managing perceptions and activities of IT, Journal of Strategic Information Systems 12 (2): 129–166.
Schultze, U. and Avital, M. (2011). Designing Interviews to Generate Rich Data for Information Systems Research, Information and Organization 21 (1): 1–16.
Seddon, P.B., Calvert, C. and Yang, S. (2010). A Multi-Project Model of Key Factors Affecting Organizational Benefits from Enterprise Systems, MIS Quarterly 34 (2): 305–328.
Soda, G. and Zaheer, A. (2012). A Network Perspective on Organizational Architecture: Performance effects of the interplay of formal and informal organization, Strategic Management Journal 33 (6): 751–771.
Star, S.L. and Griesemer, J.R. (1989). Institutional Ecology, ‘Translations’ and Boundary Objects: Amateurs and professionals in Berkeley’s museum of vertebrate zoology, 1907-39, Social Studies of Science 19 (3): 387–420.
Strauss, G. (1962). Tactics of Lateral Relationship: The purchasing agent, Administrative Science Quarterly 7 (2): 161–186.
Tiwana, A. and Konsynski, B. (2010). Complementarities between Organizational IT Architecture and Governance Structure, Information Systems Research 21 (2): 288–304.
Tushman, M.L. (1977). Special Boundary Roles in the Innovation Process, Administrative Science Quarterly 22 (4): 587–605.
Uzzi, B. (1997). Social Structure and Competition in Interfirm Networks: The paradox of embeddedness, Administrative Science Quarterly 42 (1): 35–67.
Uzzi, B. (1999). Embeddedness in the Making of Financial Capital: How social relations and networks benefit firms seeking financing, American Sociological Review 64 (4): 481–505.
Uzzi, B. and Gillespie, J. (2002). Knowledge Spillover in Corporate Financing Networks: Embeddedness and the firm’s debt performance, Strategic Management Journal 23 (7): 595–618.
Wasserman, S. and Faust, K. (2007). Social Network Analysis: Methods and applications, Cambridge: Cambridge University Press.
Williams, J. (2011). Experts warn of growth of ‘shadow IT’ use outside IT department control. Computer Weekly 20 June 2011. [WWW document] http://www.computerweekly.com/news/2240104901/Experts-warn-of-growth-of-shadow-IT-use-outside-IT-department-control, (accessed 25 March 2013).
Yin, R.K. (2009). Case Study Research: Design and methods, Thousand Oaks: Sage Publications.
Author information
Authors and Affiliations
Appendices
Appendix A
Questionnaire about actual interaction structures
1. Please indicate employees from the business unit with whom you interact a lot in the context of the IT change process for System XY and describe how and how often you interact with them.
2. Please indicate employees from the IT unit with whom you interact a lot in the context of the IT change process for System XY and describe how and how often you interact with them.
<answered within the same type of table as question 1>
3. Please indicate employees from the liaison unit with whom you interact a lot in the context of the IT change process for System XY and describe how and how often you interact with them.
<answered within the same type of table as question 1>
Appendix B
Guiding questions for main stage interviews
-
Background of interviewee:
-
° What is your background?
-
° Do you have cross-domain experience?
-
° What is your role in the IT change process?
-
-
Change process (preferably with regard to a particular example):
-
° How are (critical) changes handled? Especially, regarding the interaction of involved units?
-
° How are regular changes handled?
-
° Is that – in the eyes of the interviewee – congruent with the formal definition of this process?
-
° If it is only congruent in the eyes of the interviewee but not in the eyes of the interviewer: Interviewer should highlight elements that are different and the interviewee should comment on them.
-
° If the actual and the process perceived by the interviewee differ: Why the interviewee does not follow the prescribed process? How does this deviation help? (Applying laddering as described in the data collection section and Appendix C).
-
° What is the key success factor of the actual interaction structure (no matter whether or not it mirrored the planned interaction structure)?
-
° What would the interviewee change in the interaction structure if he or she could? How would he or she develop interaction structure on a green field? Why?
-
Appendix C
Using critical incident technique and laddering
Motivated by the fact that critical incidents can be more accurately recalled and described than average behavior (Flanagan, 1954) and significantly impact the success of the process being studied (Bycio and Allen, 2004), we asked interviewees to describe a recent change that was either handled very positively or very negatively, identifying critical incidents. Focusing on such critical situations, we asked the interviewees for factors that were most important for the eventual deviation of actual from planned interaction structures in these situations and applied the interviewing technique used in laddering to understand the connection between this aspect and the potential deviation of interaction structures in more detail. This technique allowed us to investigate answers more systematically (Rugg and McGeorge, 1995). Questions like: ‘Why didn’t you follow the planned interaction structures?’ or ‘Why in particular did this aspect influence your choice of interaction?’ were used to probe upward, respectively, downward the ‘ladder’ of means (drivers) that lead to certain ends (deviation of actual interaction structures) (Reynolds and Gutman, 1988; Rugg and McGeorge, 1995). We also asked the interviewees to describe the regular IT change process, that is, the one they actually followed for regular changes, and compared it with the planned one in a similar fashion.
Appendix D
Calculation of deviation measure
The betweenness of a group, such as a liaison unit, is calculated as the percentage of shortest paths between non-group members of which group members are part (Everett and Borgatti, 1999). Using the survey data, we derived a communication network covering involved people in the business unit, IT unit, and liaison unit. In this network, a tie between two actors means they interact at least once per week in meetings or via phone. Since we are only interested in communication between business and IT (i.e., not the shortest paths within the business unit or within the IT unit), we developed an adapted measure based on the group betweenness measure proposed by Everett and Borgatti (1999):
-
Calculation of shortest paths lengths between any pair of business and IT actors;
-
Elimination of all liaison actors;
-
Recalculation of shortest paths lengths;
-
Count of pairs of actors between which the second length is longer or who have become disconnected when eliminating the liaison actors, that is, the pairs of actors whose shortest paths involve at least one liaison person, making the liaison person part of the most probable path along which business and IT exchange information;
-
Division by the sum of connected pairs in the original network (before the elimination).
The betweenness centrality value for the planned structure was determined as follows:
-
100% when the liaison person or unit was supposed to fully channel communication;
-
0% when trilateral meetings were an integral part of interaction structures;
-
50% when the liaison unit or person should be the primary contact, yet trilateral meetings or clarifying meetings without the liaison unit or person were part of the planned structure.
This approach led to the deviation values shown in Table D1.
Rights and permissions
About this article
Cite this article
Zolper, K., Beimborn, D. & Weitzel, T. When the river leaves its bed: analyzing deviations between planned and actual interaction structures in IT change processes. J Inf Technol 28, 333–353 (2013). https://doi.org/10.1057/jit.2013.23
Published:
Issue Date:
DOI: https://doi.org/10.1057/jit.2013.23