manuscript - Faculty

advertisement
Socially Rich Interaction Through Information and
Communication Technology:
Moving Beyond the Concept of Users
Roberta Lamb
University of Hawaii, Manoa
College of Business Administration
Decision Sciences
2404 Maile Way, E601-C, Honolulu, HI 96822
Email: lamb@cba.hawaii.edu URL: http://lamb.cba.hawaii.edu
Phone: 1(808)956-7368
FAX: 1(808)956-9889
and
Rob Kling
Indiana University
SLIS, Center for Social Informatics
th
10 & Jordan, Room 005C, Bloomington, IN 47405
Email: kling@indiana.edu URL: http://www.slis.indiana.edu/kling
Phone: 1(812)855-9763
FAX: 1(812)855-6166
Working Paper
Draft 4.02 (Please do not quote without permission.)
Copyright, 2000. Roberta Lamb
1
Abstract: The concept of "user" is fundamental to much of the research and practice of systems
development. User-centered information studies have carefully examined the criteria that influence
individuals' selections of information gathering resources. In many ways, these studies have improved our
understanding of how a "good information source" fits the people who use it. However, this research
approach is limited, because the concept of "user" tends to treat people as atomic individuals.
We argue for a re-evaluation of "the user" in information systems research. Some recent empirical research
questions the applicability of user-study findings within organizations. One of our own empirical studies,
which examines how people select materials from online services, confirms that within organizations,
individual preferences have little impact on the use of these information resources. At the same time, it
suggests that the socially thin, and somewhat pejorative concept of "user" limits our understanding of
information selection. Within firms, the use of online information is embedded in communications among
organizations. These communications are shaped by industry institutions, they follow particular
conventions, and they have a certain legitimacy. In the biotechnology industry, for example, people collect
materials from online services to include within thick, complex drug application documents that their
companies submit to the U.S. FDA (Food and Drug Administration) when seeking approval for new
biologic products they wish to sell. In biotech and other industry contexts, interorganizational relationships
and institutional influences play a much larger role than individual choice in shaping the use of online
information. Focusing on the organization as "the user" can more effectively illuminate the ways in which
environments determine online resource use.
At the individual level, we suggest that a shift from the concept of "user" to the concept of "interactor" will
sharpen IS researchers' perceptions of how organizational contexts shape online practices, and will more
accurately recast people as critical facilitators of changing information infrastructures. As "interactors",
people select materials from new and existing online resources, take advantage of attendant opportunities to
modify information work roles, and migrate information practices across firms in support of organizational
communications and interorganizational relationships.
2
1.0 Introduction
Theories that shape our understanding of the design and use of information and communication
technologies (ICTs), such as online services, rely primarily on cognitive and cybernetic models. These
models have fostered a concept of the ICT “user” as an atomic individual with well-articulated preferences
and the ability to exercise discretion in ICT choice and use. Some cognitively oriented, information
systems researchers have unreflexively accepted the “user” concept. But for the most part, IS researchers
(ourselves included) have adopted the term “user”—even when describing social interactions that extend
beyond the “user” concept. IS studies frequently examine organization level phenomena where
contingency theory and technology adoption/diffusion models help make sense of system development and
customization efforts. They strive to define ICT system methods and models that will meet the sometimes
strategic, but largely internal demands of the firm, and will ensure that the resulting systems fit “user”
tasks. However, ICT design approaches that reflect the “user” concept have only achieved limited success
in creating “useful” information systems, in part, because they are based on models that are contextually
under-developed, leaving much of the organizational context outside the model.
A growing body of empirical research has failed to confirm the expected widespread adoption and use of
some key ICTs, such as online services, that have been expressly designed and implemented with “user”
concepts in mind . Such studies challenge these concepts on two levels. At the organizational level, they
accentuate the need for a larger environmental scope when dealing with the organizational influences of
ICT use. Interestingly, they attribute many “user” activities to the organization, such as initial ICT
adoption, and repeated selection in task-related use. More importantly, these studies show how individual
choice is constrained by organizational contexts. At the individual level, they identify the complex ways in
which individuals interact within and among organizations, and how ICTs become part of those
interactions.
This challenge from empirical research, and other critiques of the “user” concept (Bannon, 1991; Suchman,
1996; Westrup, 1997), suggest that a reconceptualization of organizational individuals as social interactors
3
would be more appropriate. This emergent view could fundamentally reshape thinking about information
system design, ICT adoption and organizational use. In this paper, we further develop this new view of the
individual as an interactor, building on the concepts of network society theorists (Castells, 1989, 1996,
1997, 1998; Bell, 1973, 1976), as well as the rich descriptions of empirical studies that show how
organizational contexts constrain individuals when it comes to making choices about ICT use. These
underpinnings help to identify some key activities of organizational interactors, and help to reframe their
use of ICTs. Instead of labeling people as passive “users”, we begin to view them more accurately as
selectors of information for embedded interorganizational communications, and as critical facilitators of
changing information infrastructures. They are ICT “designers-in-use”, who take advantage of
opportunities to modify work roles and develop new information practices. And they are ICT proliferators
who spread information practices within and across organizations.
In the next section, we will examine the theoretical constructs that shape the ICT “user,” and then present
some empirical challenges and theoretical constructs that help us reconceptualize the “user” as an
“interactor.” We close our discussion with an invitation to the IS community to try out our
reconceptualization by considering what kinds of ICT design concepts would help practitioners develop
information systems that support and strategically enable organizations and their social interactors. We
believe that removing the “user” label from key information systems constituents can encourage more
contextualized understandings and better predictions of ICT use, as well as a better dialogue about ICT
design. To initiate that dialogue, we put forward a rich conceptual understanding of ICT use in
organizations, that emphasizes the relationships that simultaneously drive individual and
interorganizational interactions, and constrain choices about ICTs.
2.0 Interacting through ICTs
Throughout this paper, we refer to people who use ICTs , like online services and intranets, as
“interactors,” and we stress that they gather data and use computers to support their primary activities as
professionals or as organizational staff members. A more robust treatment of the empirical research that
4
supports this position is presented in a later section, but we feel it is important to illustrate clearly what we
mean by socially rich, interaction focused research early in the paper. The following excerpt, taken from a
recent study of commercial real estate brokers (Lamb, 1997), highlights the dense web of interactions that
ICT use supports for a typical broker, and will serve as an example of socially rich interaction.
2.1 An inside view of ICT use
Commercial real estate brokers typically deal with institutional investors. These investors may make their
decision to buy, sell or build a property after carefully reviewing several thick property reports.
Experienced investors often make intuition-based decisions. But even when decisions are based on
intuition, commercial real estate brokers still gather a significant amount of data, and compile an equally
thick property report because underwriters require statistical data to validate the investor’s intuition, and
because investors often need to justify their decisions to others in their firm. The broker, then, may ask his
in-house commercial research team to compile an impressive information package that will “pass muster at
a Wall Street scrutiny level.” The research director and her team will then embark on an information
packaging project, such as the one described here, that may take several months, make use of a wide range
of ICTs, and involve a number of different organizations:
We put together a package that had multiple components. It was about 3 inches thick.
First of all we went through and we pulled upon demographic sources...its online. And
so you’ve got demographic statistics, employment, growth, population, income,
education-- all these statistics defining the demographics of the market area. So that was
one section of it.
Then another section was to go through and pull upon our databases, our property
availability databases, which is fed by local and national vendors as well as our own
clients and listings brochures and so forth, and say “OK, this is a snapshot of where we
currently are in the marketplace.” This is what’s currently available. This is what current
lease rates are and so forth. Then we went through and we pulled upon one other
database, which are comps, sales and leases that were done. And we said, “OK,
historically this is where we’re at. So this is where the trends are up to the current date.”
Then we have a national research arm... a national market analysis and forecasting group.
And they go through and they take information that we collect at the local level. They
upload it and they have an econometric model that they run and from that comes
projections--projected absorption, projected vacancy rates and projected lease rates...
5
Then we also went onto the Internet. And from the Internet we pulled articles... [W]e
pulled what information we could from [local transportation agencies]...We also did some
migration studies...Companies, when they took a space, where were they coming from?...
And then we pulled all the pieces together, and then we wrote an analysis at the front end
of this...Then we had an executive summary saying “OK, based upon 3 inches of data,
attached in the addendum, here’s the interpretation that we lay on all this”...And so we go
through and we pull out the salient facts from 3 inches of statistics, and we present an
analysis--insightful interpretation which substantiated what the client was trying to
accomplish. Because the client intuitively was on the right track. But we were able to
demonstrate that they were on the right track in a way that was not intuitive. In a way
that was statistically quantifiable. And that was what an underwriter was looking for.
In this case, the package was delivered to the intuitive investor and then to the underwriter as a 3-inch thick
report. Frequently, after a report like this one is compiled, the broker will select graphical data displays and
key statistics from the report to put together a professional multimedia presentation that may also include
glossy photographs of the property or video-walkthroughs of the buildings to help convince the investor
that this is the right property to buy, and that he is the right broker to work with.
This scenario shows how information packages and ICTs signal broker competency to investors, and at the
same time illustrates how client-broker interactions shape ICT use in commercial real estate brokerages. It
illustrates how ICTs become technologies of interaction, and that their use depends on shared assumptions
about what is legitimate.
2.2 MIS perspectives on ICT use
People use ICTs and their information products when interacting with others, within interorganizational
contexts where roles and power relationships differ as do perceptions about the appropriate use of
technology. This view reflects the Socially Rich Interaction focus, which is one of three that we have
found useful in classifying IS research perspectives. (See Table 1.) It contrasts sharply with the
Individualistic “user” view that focuses attention on the person at the computer and her attitudes or
preferences about information gathering and ICT use, and has more predictive power when it comes to
determining who will use ICTs and how intensively they will use them (as it did in our real estate study.)
The Socially Rich Interaction view also better indicates how ICTs will be used in organizations than does
the Socially Thin Interaction view (see Table 1), that guides a large segment of IS research. This research
6
view is more expansive than the Individualistic view, but generally retains an inside-the-firm focus and
does not develop a detailed perspective of interfirm interactions, and how they drive ICT use. We will
contrast these views in this paper to encourage a reconceptualization of the “user” of ICTs that we believe
will helpfully refocus information systems design.
Table 1: Conceptual Focus in IS Research Studies
Focus
Individualistic
Socially Thin Interaction
Socially Rich Interaction
Technology
Computer
Computers, Networks
Technologies of Interaction
Participants
Individual
People performing formal task
Human activity systems and
systems
important relationships that can
extend outside their focal
group—in institutional settings
Settings
Task/Technology
Task structures and their
Complex and multivalent social
execution and coordination
relationships
2.3 An MISQ survey
Some of the ideas that we will drawn upon to reconceptualize “users” as “interactors” are not new. One
can find them sporadically expressed in the literature of Human-Computer Interaction (HCI) researchers
and of the Computer Supported Cooperative Work (CSCW) community. However, both groups, like their
IS counterparts, have been dominated by researchers whose perspectives and theoretical approaches favor
atomic “users”, even though CSCW technologies examine group interactions primarily. In MIS literatures,
researchers have criticized the treatment of “users” during information systems development (Markus and
Bjorn-Andersen, 1987; Beath and Orlikowski, 1994), but few have challenged the “user” concept itself
(Woolgar, 1991; Westrup, 1997.)
To determine whether IS researchers had begun to change their thinking about “users,” we reviewed MIS
Quarterly articles from January, 1996 through June, 1999. We did not try to make a distinction between
7
positivist and interpretivist perspectives, nor between qualitative and quantitative methodologies.
Depending on the focus of the study, any of these types of articles could express a shallow “user” view, or
neglect to mention ICT use at all. Of the 70 articles we classified1, nineteen expressed the Individualistic
“user” perspective we mentioned above. Thirteen adopted the Socially Rich Interaction perspective that we
will outline in more detail throughout this paper. Twenty-two articles fell somewhere in the middle. They
expressed a Socially Thin Interaction view of ICT use – often referring to people as “users”, but sometimes
mentioning their interactions with others when describing IS use. The final sixteen articles made No
Mention of IS use or “users,” focusing instead on the organizational economics of IT, or issues of IS
pedagogy and research methodology.
Although, based on this limited survey, it appears that new treatments of “users” have not been widely
taken up and entered into the IS canon yet, there is a base of socially rich, interaction-focused literature on
which we can build conceptually. From the thirteen articles identified in our review as Socially Rich
Interaction, IS researchers can get a sense of the vivid details that emerge, along with a better
understanding of the possibilities for supporting communications and interactions with ICTs, when
conceptualization of the “user” changes. In a later section, we will return to a few of these articles to show
how they challenge “user” concepts, and support a shift to social “interactor” concepts.
3.0 The trouble with “users”
3.1 Theories about “the user”
We contend that the theories about the user that guide ICT design are contextually under-developed,
leaving the organizational context outside the model. The design of online services, for example, has relied
heavily on individualistic models to explain the use (and, frequently the non-use) of their products by
librarians, research intermediaries and “end-users”—i.e. people who gather information from online
databases for use in their own decision-making and work-related tasks. Studies of this type that seek to
inform online design examine how task models, ergonomic factors and cognitive psychodynamics define
1
See the Appendix for details on our characterization of each article, and an explanation of our evaluations.
8
the limitations of human interaction with the computer (Norman, 1986; Shneiderman, 1987.) In this view,
all humans have the same set of capabilities and limitations, albeit to differing degrees, ranging from
novice “users” to expert “users.” Their studies most often take the form of laboratory experiments or
surveys that evaluate the task/technology fit of computer systems at the individual use level.
These “user” studies draw heavily on the cybernetic models of Herbert Simon, especially his ideas of
bounded rationality and learning through information feedback and adaptation (Simon, 1988.) In
information systems research, studies that seek to understand “user” satisfaction with information systems
and MIS services also frequently draw on Simon’s decision theory, particularly his models for consumer
choice that explain the satisficing behaviors of “customers” and their coordinations through free-market
interactions. Even CSCW researchers, who seek to understand the coordinated use of complex information
systems by people in organizations, continue to rely on these rational ideals to explain system use in terms
of market interactions, organizational hierarchy, process flows, contracting, negotiating, and planning
activities (Malone & Crowston, 1990.)2 Throughout the past 30 years, these studies have enormously
improved our understanding of how a "good information source" fits the people who use it. Therefore, we
wish to state clearly that the discussion which follows is not meant to criticize this line of research or the
results of these studies, but to call into question the concept of the “user” which these studies have come to
reflect over time.
3.2 The concept of “the user”
The use of individualistic models has led to a research concept of “the user” as an atomic individual with
well-articulated preferences and the ability to exercise discretion in ICT choice and use, within certain
cognitive limits. The place for “the user” is at the user interface to the computer, where interactions center
on the exchange of information between the system and the individual.
2
For an interesting counterpoint to rational planning processes, see Suchman (1987).
9
“User studies” informed by this concept have taken researchers a long way in their understanding of what
makes a computer interface easy to use, and ergonomically comfortable to use continuously. But by
concentrating experimental studies on this individual “user,” cognitively oriented IS researchers may
inadvertently limit the kinds of “user” phenomena they can study. For example, to understand why “better”
systems often go unused, Todd and Benbasat (1999) constructed a series of studies to measure “users”
evaluation and use of decision support tools. Their findings repeatedly show that individuals choose easierto-use systems, even over systems that are functionally richer, faster, and provide better decision support.
Surveys of “end-user” PC use in small firms report similar results (Igbaria et al., 1997.) Carroll and Rosson
(1987) have tried to explain this phenomenon by extending their “user” studies to examine the conflicting
motivational and cognitive strategies that conspire to keep people from learning to use new systems. Their
approach begins to account for history and work-related contexts, but their treatment of the “user” is still
conceptually bound by individual-focused cognitive and cybernetic learning theories, and their remedies for
bad interface designs center around trying to make the system easy and rewarding to learn.
Within organizations, however, individuals don’t always have the opportunity to choose the systems they
would prefer to use. For those individuals, this concept of the “user” is a mischaracterization that
engenders faulty expectations about ICTs as “single-user,” “empowering,” and “widely applicable.” In
addition, this one-size-fits-all concept of “the user,” when aggregated to predict organization-wide activity,
leads to frequent overestimates of ICT use.
3.3 Theories about the organizational use of information systems
Many information systems researchers have assimilated the “user” concept into their studies of
organizational IS. Most, including ourselves, have at times unreflexively employed the term “user” to talk
about ICT use (Kling, 1977.) In our review of recent MIS Quarterly articles, we distinguished between
those who use the term and those who adopt the concept. Many readers, however, are not as discerning.
Perhaps the concept of “user” often goes unquestioned among IS researchers because it is analogous to the
10
idea of “worker,” and the dichotomy between IS developers and “users” resembles the separation of
managers and workers which pervades organizational literature.
When seeking to understand the use of information systems in organizations, North American IS
researchers often rely on technology adoption and diffusion models (Rogers, 1962), and on economic or
open-systems models of the firm and its markets, such as competitive interaction models, resource
dependency theory, contingency theory and transaction cost theory (Porter, 1980; Pfeffer, 1981; Lawrence
and Lorsch, 1967; Williamson, 1981), that examine the contribution of information systems and
information structures to overall firm viability. The IS researchers who use these approaches to make sense
of system development and customization efforts at the organizational level, take into account both internal
firm dynamics and environmental factors. The “user” is not the focus of study, at this level, and often
receives no mention. (These types of studies are classified as No Mention in our MIS Quarterly article
review; see Appendix.) IS researchers who are guided by these theories often seek to identify the strategic
form/fit formula that will explain successful ICT interventions and help managers appropriately tailor ICT
designs. They strive to define ICT system methods and models that will meet the sometimes strategic, but
largely internal demands of the firm.
When examining ICT use inside the firm, IS research studies more often focus on the actions of managers
and their effects on overall system success, rather than the actions of “users.” These studies are intended to
help managers of IS development focus on the critical factors that will ensure success, such as identifying
technology champions and providing training. Research efforts are directed toward designing systems that
fit “user” tasks, otherwise toward refitting “user” tasks to system designs.
This line of research has helped managers avoid many of the pitfalls that plagued early ICT
implementations. However, as IS researchers themselves have noted, management-focused ICT design
approaches have only achieved limited success in creating “useful” information systems. Some of these
studies carefully examine firm dynamics to explain the use and non-use of new ICTs, and they often allude
to the interactions between managers, system developers and “users.” (These types of studies are classified
11
as Socially Thin Interaction in our MIS Quarterly article review; see Appendix.) A few have suggested that
a key reason for implementation failures is that “users” have been left out of the system design process.
3.4 User-centered ICT design
Many IS designers have attempted to bring “the user” into the design phase of ICT development. These
attempts, such as Joint Application Design (JAD), have taken on various forms and have achieved varying
degrees of success (Davidson, 1999.) But even after reflecting upon the “user” as an important member of
the overall system, many designers retain an individualistic cognitive perspective. (These studies are
classified as Individualistic in our MIS Quarterly article review; see Appendix.) Their “user-centered”
approaches strive to design systems that meet “user” needs, and to devise tests that measure systems
“usability” and “user” satisfaction. Many of their lab results, as discussed earlier, continue to advocate
easy-to-use systems. When taken into organizations, however, the systems that these approaches produce
have met with mixed reviews (Gasson, 1999, Kling and Elliott, 1994.)
More radical attempts to create useful systems have sought to engage “users” more meaningfully in IS
design by allowing them to participate as equals in the design process. However, when developers and
“users” try to work together on system design, power imbalances frequently prevent “users” from making a
real contribution (Blomberg et al., 1994; Beath and Orlikowski, 1994; Markus and Bjorn-Andersen, 1987.)
4.0 Empirical challenge to “users” and support for “interactors”
Ironically, as some researchers continue to try to incorporate individual “user” needs more fully into system
design, studies are beginning to show that, within organizations, individual preferences don’t determine
ICT use. Studies such as these, which begin to tease out what is happening with organizational ICT use at
the individual level, take on a more interactive and socially rich focus. (These types of studies are classified
as Socially Rich Interaction in our MIS Quarterly article review; see Appendix.) They begin to explain
how people work together to use ICTs effectively.
12
4.1 Challenging the “user” concept
Socially rich interaction studies challenge the “user” concept and the applicability of its theoretical
underpinnings on two levels. First, organizational IS studies accentuate the need for a larger environmental
scope when dealing with the influences of ICT use. Individual ICT use is influenced not only by
organizational contexts, but also by interorganizational and global contexts (Baldwin and Rice, 1997;
Lamb, 1997; Walsham and Sahay, 1999.) Second, socio-technical studies suggest that a focus on
interactions can better describe the ways in which people come to use ICTs to support their organizational
and interorganizational activities. Individual interactors often fail to use ICTs in expected ways, and
frequently reshape technologies to suit their needs (Kumar, 1998; Kling, 1987, 1992; Lamb, 1997.)
Studies that indicate the “user” concept is too narrowly defined, often point out that ICT use projections
based on “user” studies, do not accurately predict use outside laboratory contexts. Many “user” study
findings simply don’t scale up to the organizational or industry level. For example, Baldwin and Rice
(1997) have found that, among financial analysts, their interactions in financial institution settings – not
their individual preferences -- determine “user” selection of information sources, such as online services.
Lamb (1997) has found that this phenomenon is not unique to financial analysts and their investment
brokerages. People who gather information within a variety of industries are similarly constrained by
organizational contexts in their use of online services. Within the firm, individuals rarely have the
opportunity to choose the ICTs they use; instead they select among a set of resources chosen at the
organizational level.
By focusing on the larger industry context, Lamb’s study goes on to describe how the informational
environments of inter-related industries shape online use at the organization level, consequently shaping the
contexts of individual use (Lamb and King, 2000.) As the real estate brokerage example from this study
discussed earlier shows, the use of online information is embedded in communications among
organizations. These communications are shaped by industry institutions, they follow particular
13
conventions, and they have a certain legitimacy. In the biotechnology industry, as another example, people
collect materials from online services to include within thick, complex drug application documents that
their companies submit to the FDA (Food and Drug Administration) when seeking approval for new
biologic products they wish to sell in the US. In biotech and other industry contexts, interorganizational
relationships and institutional influences play a much larger role than individual choice in shaping the use
of online information.
Moreover, influence on individual ICT use is not constrained to the organization level or the industry level,
but, as an article from our MISQ survey by Walsham and Sahay (1999) shows, is often cultural and global
in scope. Their study of the development and use of geographic information systems (GIS) in India
illustrates how global influences to adopt particular types of ICT “solutions” can be in conflict with cultural
systems of interaction. They describe the difficulties that beset Indian scientists and administrators who
were tasked with the adoption of GIS systems developed in the US. Critically, these systems reflected a
western viewpoint about the usefulness of maps and spatially-related data, and were intended to be used
within interactions that adhered to western protocols of rational decision-motivated coordinated action. In
this study, the non-use of GIS by administrative field officers in their day-to day work is explainable not
simply as net result of their personal preferences about the technologies themselves, but as their inability to
mobilize the huge effort that would be needed to reconstruct local interactions around use of GIS systems.
Appropriately, Walsham and Sahay’s prescriptions go beyond common participation and training remedies,
to higher-level interventions in educational processes and administrative structures of interaction.
The findings of these studies attribute traditional ICT-related “user” activities (i.e. initial ICT adoption,
and repeated selection in task-related use) to the organization, suggesting that in some ways it might make
more sense to consider the organization to be the “user” of ICTs. After all, this is the level at which
choices about ICT adoption and use are made, and at which environmental influences shape the need for
ICT use. Organizational decisions about ICTs and work contexts constrain individual ICT choices. If we
consider the organization to be the “user,” what role is then left to the organizational individual? Studies
that do not examine individual interactions within firms are silent on this point, giving the impression that
14
the individual’s role is merely to use or not use the organizationally chosen ICT. However a few studies
have described the complex ways in which individuals interact within and among organizations, and how
ICTs like online services become part of those interactions (O’Day and Jeffries, 1993; Lamb, 1997.) We
now examine how those studies can help us reconceptualize the “user” as a social interactor.
4.2 Social interactors in empirical IS research
Kumar et al’s (1998) MISQ article “The Merchant of Prato – Revisited: Toward a Third Rationality of
Information Systems” is particularly illustrative for situating ICT use (and non-use) within social
interactions. In seeking an explanation for the failure of an interorganizational system in the Prato district
of Italy, these authors focus on the rich tapestry of relationships which constitute “business” in the textile
industry. They analyze system use by determining its value to people who are social interactors building
long-term bonds of trust and foundations for future economic rewards. By examining the nature of
interactions among Prato district merchants, Kumar et al. explain why these people did not use an
interorganizational online information system as predicted. The system was designed to reduce the
transaction costs of their interactions. What system designers did not realize, because they did not analyze
merchant interactions from a sociological perspective, was that their transaction costs were already quite
low, due to the level of trust that they had built up through centuries of trading, and generations of
interfamilial ties. This presentation contrasts sharply with the cognitive/economic perspective that guided
the designers of the failed online information system, and shows poignantly what new socially rich
treatments of the “user” can offer.
Socially Rich Interaction studies frequently report that within organizations ICT use does not achieve
predicted effects. Personal computers, for example, do not by themselves empower “users” to make better
decisions or become more personally productive, especially in clerical work environments where work
tasks are highly constrained and tightly monitored, and where personal advancement is limited (Kling,
1992; Clement, 1994.) In less constrained environments, like the Internet, some “user”-based projections
have been similarly acontextual. For example, many early projections of what students would want to
15
share on the Internet, highlighted their ability to self-publish. Academics originally envisioned that
students might share their poetry, and other creative writings. Actual uses have been radically different
from those envisioned—instead of sharing poems, students are sharing class lecture notes on the web
(Blumenstyk, 1999.) Companies are reportedly paying some students to take notes in class, and are then
post them on their company web sites. The notes are freely available to any visitor to the site. Students
don’t read class notes, as they might read poetry, for their own personal pleasure; they read them in order to
meet the expectations of faculty. Some faculty members, however, view this interaction as highly
illegitimate, fearing that students will receive faulty information, and that they themselves may suffer real
losses in terms of course materials they “own” or, possibly, their positions as faculty members (Singham,
1999; Olsen, 1999.) In this example, we see that students have used Internet technologies of interaction to
proliferate the spread of an information practice (i.e. sharing notes) within their own University
organizations, and via outside company web sites, across other University organizations. These ICTenhanced networks of social interactions foreground the institutional aspects that both constrain and enable
the activities of students and faculty members as interactors. As in this example, “interactors” use
information systems in different ways than analysts expect “users” would use them, and they require
different considerations in ICT design.
But even within tightly controlled organizations, “users” find new ways to use ICTs to support interactions
with their firm’s clients, regulators, competitors and partners. Even though the individual does not often
have an opportunity to exercise much discretion in adopting an ICT, she plays an essential role in making
the chosen resource work for her firm. As Lamb (1997) reports, biotech firm members continually
develop, modify and communicate new data gathering and data management practices. These facilitate the
use of information resources that are chosen at an organizational level. Resourceful “users” have
significantly enhanced single-user productivity tools, like spreadsheets. In some cases, people have
effectively transformed them into multi-user ICTs by sharing spreadsheet templates and developing ways
of working with them so that they support key organizational interactions (Nardi, 1991.) Innovation
researchers have also noted that ICT use (and other technology use, as well) often involves inventive
16
adaptations by “users” (von Hippel, 1988.) Such “users” are effectively ICT “designers-in-use”, who take
advantage of opportunities to modify work roles and develop new information practices.
Over the years, as “users” have become more comfortable with computers, they have altered their
information systems role, doing more and more of the things developers have traditionally done. The
phenomenon of “end-user” computing began in the early 1980’s when “users” introduced PCs into their
organizations. Many of these “end-users” were tired of waiting for new applications to be developed by the
IS department, and they saw PCs and desktop applications as an opportunity to enhance their own
computing environments. The advent of “end-user” computing has enabled many “users” to become
designers and developers of their own desktop programs, simultaneously reducing the need for IS
department application development. In an ongoing study of intranet development and use, Lamb has
found that “end-user” computing is gaining new momentum as organizational professionals configure local
intranets to support the complex document management requirements of regulatory interactions (Lamb and
Davidson, forthcoming.)
These studies identify some of the complex ways in which individuals interact within and among
organizations, and how ICTs become part of those interactions. Taken altogether, they encourage us to
view people more accurately as selectors of information for embedded interorganizational communications,
and as critical facilitators of changing information infrastructures, instead of labeling them as passive ICT
“users”.
4.3 From “users” to “end-users”
Among those who directly experience the everyday exigencies of information systems development and
maintenance, there is a latent sense that “user” concepts and characterizations don’t ring true. As noted
earlier, critiques of the “user” concept have appeared in IS-related literatures (Bannon, 1991; Grudin, 1990;
Westrup, 1997.) They are motivated by experiences that systems designers and developers in the HCI and
CSCW communities have shared with systems “users.” While these authors unanimously agree that the
17
term “user” paints an inappropriate and somewhat pejorative picture of the people for whom information
systems are created, they are divided on how to remedy the situation. Bannon (1991) believes that “users”
could be better served if designers understood them as “actors…with sets of skills and shared practices
based on work experience with others” (p. 25.) He suggests that designers would do well to get out into the
workplace, and learn who the “real users” of their systems are, and the kinds of things they do. He believes
that by doing this, developers will see that “users” are not naïve “novices”, but skilled “actors” performing
complex workplace tasks, and will abandon their inappropriate conceptions. Grudin (1990a; 1990b) has
launched a sustained attack on the “user” concept, reminding us that “drug users” are the only other “users”
commonly referred to by that term. He traces the term from its earliest inception when it was coined to
differentiate computer engineers from computer “users.” Until that time, the engineers were also the users,
and there was no point in trying to make any distinction. Between then and now, however, the term has
become encumbered with the notion that “users” – in sharp contrast to their highly skilled, intelligent
developer counterparts – are technologically challenged, unskilled drones who are working individually on
well-defined tasks and must be protected from their own inevitable errors.
Of course, researchers have frequently noted that “users” don’t hold the same view of themselves that IS
analysts do, and they don’t like to be referred to as “users” (Markus and Benjamin, 1996; Beath and
Orlikowski, 1994; Grudin, 1990b; Dagwell and Weber, 1983.) In fact, “users” don’t think of themselves as
primarily having anything to do with the computer at all. They see themselves as professionals, working
with others, and using computers in support of those interactions. They are rewarded for the work they do,
not for using computers. The realtor who goes online to search for data on recent home sales is rewarded
for selling houses, not for doing online research.
One might expect that as “end-users” and developers began to share the same tasks the term “user” would
have disappeared. The very term “end-user” should indicate that the “user” concept has broken down. But
as Westrup (1997) has noted, the IS “designer” is also continually constructed in the process of IS design
and use. IS development methodologies are firmly rooted in atomic “user” concepts, and they strongly
18
reinforce the dichotomy between “users” and “designers”.3 Despite the empirical evidence which clearly
portrays “users” as people who make sophisticated adaptations of ICTs to facilitate their interactions within
interorganizational networks, and the “gut feelings” of many developers that “user” notions are inadequate
to describe information systems phenomena, common conceptualizations have only shifted from the “user”
to the “end-user.” But empirical observations, gut feelings, and impassioned critiques do not provide a
theoretical basis upon which to build a better “user” concept. We believe that a theoretically based
reconceptualization of the “user” as an “interactor” is required to move IS research beyond this impasse.
5.0 Reconceptualizing “users” as social interactors
The isolated “user” is not a particularly helpful concept in contemporary organizations. We doubt that this
is entirely unrelated to the major changes in the types of ICTs that are now available as networked
technologies. (Although even in the days of the non-networked PC, atomic “user” concepts provided only
limited insights into organizational ICT use.) As Castells (1996) argues, ICT networks are themselves
interlinked with trends towards more globalized organizations and markets. We will build on his theories
to develop our concept of the “interactor.”
5.1 The concept of “interactor”
Descriptive attempts to recast the “user” as a savvy, skilled, resourceful equal of systems analysts and
developers have made convincing arguments for reconceptualization. Better descriptions, like those of
Kumar and Lamb, not only make a case for understanding the “user” as intelligent and highly skilled, but
they also describe what people are doing when they’re using computers – they’re interacting with others on
behalf of the organization. They’re interactors. As we have shown, ideas about interactors are recurrent in
many research analyses; but they have not been systematically selected and integrated for the construction
of a guiding design concept. We now draw on the work of Manuel Castells to begin that integration.
3
Even the academic publication which focuses on this phenomenon, The Journal of End-User Computing,
19
According to Castells (1996, 1997, 1998), social networking has become the main principle of social
organization. Organizations and economies are becoming at the beginning of the millenium more
informational, more global and above all networked. Social networks are taking shape between
organizations, such as business alliances, as well as between individuals. They are reinforced through new
transportation and communication technologies, so that they often extend nationally and internationally.
ICTs, as instruments of mediation which affect social and power relations, are necessary but not sufficient
to these social transformations. Coordination is achieved through social interaction. The core
organizational activities that can work on a global scale are also enabled by deregulation, organizational
capacity and global financial transactions. An important systemic feature of networks, is that they both
connect and disconnect. On a global scale, this translates into the social inclusion and exclusion of people,
organizations and economies. This selective connectivity and reconfigurability is essential to the network
dynamic. Ultimately, Castells concludes that all networks are networks of individuals (Castells, 2000.)
However, these individuals are clearly not isolated, atomic ICT “users.” In fact, a critical part of Castells’
analysis emphasizes the ways that ethnic and other identities are being heightened, rather than diminishing
in this era.
Even this brutally brief summary of Castells’ network society theory presents a multi-dimensional view of
ICT use (see Table 2), that resonates with the findings of the empirical studies that we cited earlier. It also
joins neatly with certain perspectives and methodologies that have provided valuable insights to IS
researchers. The insights that we highlight in this discussion come largely from new institutionalists 4 who
does not seem to challenge “user” concepts.
4
We could have linked Castells’ theory to ICT studies guided by structuration theory, social network
analysis, or actor-network theory, but each of these choices presents some difficulties. Structuration
theory, like institutionalism, does not theorize directly about ICTs or networks; although new
institutionalism does strongly incorporate symbolic interactionist concepts which lead more easily to
networked explanations of ICT use. Social networks theory has a direct link to Castells’ work, and these
studies have provided much of the data for his theorizing. However, we find that social network analyses
adopt a social realist perspective about the networks under study, when in our view these networks are
more often potential, and informally communicated, rather than manifest. Some studies cited here have
found that actor network theory (ANT) provides helpful explanations of network level phenomena. But as
we have argued elsewhere, theory and methodology are inextricably linked. ANT methodology has been
used to explore activities that are at a level of projects and relatively modest scale networks, rather than
whole social sectors or societies. (A study of the pasteurization of France, for example, does not entail the
20
have been helpful in situating the use of information and new technologies within the social structure of
organizations in ways that incorporate many of the key ideas from other theories, such as structuration
theory and symbolic interactionism. In addition, the empirical studies of new institutionalist researchers
have provided socially rich accounts of the interactions which shape technology use and the roles of
interactors. Although new institutional theorists have not theorized explicitly about ICTs, interactions
through social networks are fundamental to their theories.
New institutional theorists reject the rational-actor models that shape the “user” concept. They focus,
instead, on the properties of groups, organizations, industries, and societies that cannot be reduced to
aggregations or direct consequences of individuals’ attributes, preferences or motives (DiMaggio and
Powell, 1991.) They contend that, with respect to the adoption, development and use of technologies, the
actions of organizations are shaped by the institutional environment (Meyer & Rowan, 1977.) As a result,
Friedland and Alford (1991) state that it is not possible to understand individual or organizational behavior
without locating it in a societal context. People are pressured to perform legitimate actions and interactions
within institutionalized arrangements. Therefore, people are not guided by preferences that are exogenous,
ordered, and stable; but relative to the changing situation.
Thus, interactors seek to communicate with others in socially legitimated ways, and often through
networked ICTs. Their selection of information media for interorganizational communications is often
influenced by institutional norms, rather than their personal preferences. Academics, for example, have
been slow to publish their research in electronic media, partly because they are not sure how these
publications will be evaluated in the tenure process (Kling and Covi, 1995.) At a recent meeting of
information system scholars to discuss publishing in electronic journals, tenure concerns were repeatedly
raised.5 Many of these scholars expressed concern that the research they published in electronic journals
would be strongly discounted by faculty in other fields who would be reviewing their cases for promotion.
same scope as a study of the industrialization of France.) And network society theorists do not look to ANT
for explanations that can help us understand the network society (Castells, personal communication, March,
2000.)
5
This meeting was part of the AMCIS ’99 Conference in Milwaukee, WI.
21
Such discussions show how examining the perceived legitimacy of ICTs, like e-journals, by various groups
who interact with the faculty as authors helps us understand ICT use and non-use. These groups include
tenure committees and deans, who themselves may never read or publish in electronic journals.
Understandings of e-journal adoption and use must engage perceptions of legitimacy, particularly the
interactions between faculty authors and tenure committee members who are far from their sites of online
authorship and ICT use.
Members of professional networks commonly construct shared views of what is legitimate. Those views
may discourage ICT use, as with academic authors. They can also make the use of ICTs highly attractive,
as we noted earlier in the case of commercial real estate brokers who must compile statistical evidence for
investments that will satisfy the legitimacy concerns of underwriters. Firms may be pressured by a number
of different stakeholders to use or not use ICTs in their interactions with other organizations. Individuals
and organizations are simultaneously influenced in different ways to use ICTs, because they belong to
multiple, somewhat overlapping, networks, that may differ in their shared views of what is legitimate. The
merchants of Prato, for example, would not require the 3-inch report of statistical support that institutional
investment underwriters require, because the interconnected networks that shape their actions include
familial networks where legitimacy rests on history and trust, in addition to commercial networks that
establish legitimacy through information exchange.
Despite the institutional character of information systems, interactors do not merely resist or accept change,
they are also critical facilitators of changing information infrastructures who take advantage of
opportunities to modify work roles and develop new information practices (Kling and Iacono, 1989.) The
institutional structures that constrain individual actions also provide new avenues of communication,
allowing members to use the strong ties of their organization’s formal networks as well as the weak ties of
their informal networks of interpersonal relations to effect outcomes (Krackhardt, 1992; Granovetter,
1973.) They may, also, promote interactions that involve ICTs in very different ways from those that the
“user” concept would suggest, as evidenced by studies cited earlier. Institutional concepts, when combined
with network society theories, can provide insightful analyses of how people change their interaction
22
practices, not only in response to the changing efficiencies of new technologies, but also in response to the
expectations of others in their social networks (Clegg, 1990.) They help us construct a multi-dimensional
view of people working with ICTs as “interactors” rather than as “users” (see Table 2.)
Table 2: Multi-dimensional View of the “Interactor”
INTERACTOR DIMENSIONS
CHARACTERISTICS of a connected and situated individual
Affiliations
1.
Relationships driven by context
(networked associations)
2.
Dynamic, change with “flows” of capital, information, etc.
3.
Multi-level, multi-valent, multi-network (global/local,
local/global, group, organization, intergroup, interorganization,
culture)
Interactions
1.
Perform socially embedded, highly contextual actions
2.
Seek to communicate in legitimate ways
3.
Transform and embed available informational resources into
connections and interactions (ICTs are part of the interaction
process, “interaction technologies”)
Identities
4.
Build, design, develop interactions that facilitate “flow” changes
1.
Connections transcend roles
2.
Ethnic and multiple other identities heightened
Based on the foregoing network society theories and new institutionalist insights, we define an “interactor”
as an individual who is responsible for communicating and interacting with others through a social
network. Interactors often belong to multiple social networks, such as collegial networks within their
organizations, and professional and family network s that may extend outside their organizations.
Interactors often have conflicting and ambiguous requirements about the activities they perform, and the
socially legitimate ways in which to perform them. Many interactors exercise limited discretion in ICT
choice and use, since they are constrained by organizational and institutional contexts. The place for the
“interactor” is within a social network, where interactions center on the exchange of symbolic information
23
between members of organizations. They may use computers and information products as part of their
activities to support interorganizational and interpersonal relationships. However, interactors are not
primarily “users” of information systems – that focus is secondary, at best. They may work as attorneys,
biotechnology researchers, inspectors, plant managers, real estate agents, investors, students, teachers, and
others, primarily interacting with one another, and sometimes using ICTs in some of those interactions.
6.0 The implications of a reconceptualization
We believe that a shift from the concept of "user" to the concept of "interactor" will sharpen IS researchers'
perceptions of how organizational contexts shape online practices, and will more accurately recast people
as critical facilitators of changing information infrastructures.
6.1 Considerations for “interactive design”
Researchers who recognize people’s capacity for innovative uses of ICTs have suggested that one way to
tap that wellspring is to provide them with highly configurable systems (von Hippel, 1998.) However,
others have criticized this approach for adhering to the “ICT as a tool” perspective which undergirds the
“user” concept (Westrup, 1997.) A shift from the “user” to the “interactor” can move IS designers beyond
this sticking point, and should be helpful for thinking and talking about the whole information systems
context, allowing interaction to play a role in that discussion. Such discussions will lead not to different
ICT designs, but to different “information system and organization” designs. A comparison of the
introduction of Lotus Notes into two different consulting firms illustrates this point (taken from Kling and
Lamb, 1999.)
ALPHA6 is an international consulting firm with tens of thousands of employees worldwide, and about
10,000 of them in the U.S. In 1989, the vice-president of information systems bought 10,000 copies of
Lotus Notes. Depending upon how Notes is used, it can act as an e-mail system, a discussion system, an
electronic publishing system, and/or a set of digital libraries. At that time, Lotus Notes was superficially
24
similar to an Internet-like system with bulletin boards and posting mechanisms, discussion groups and
electronic mail. The vice president believed that the firm’s line consultants, who worked on similar
projects in offices all over North America (but, none of whom were located in his corporate office), could
use some kind of computerized communication and information system to store what they knew, and to
share it. He also believed that Lotus Notes 1.0 was such a powerful new technology that it would sell itself.
No consulting applications of Lotus Notes existed yet, but the VP did not see this as a problem. To the
contrary, he thought that examples might hinder inventive new uses--the main thing to do was to rapidly
roll it out to the consulting staff and let them use it to find creative ways to share information.
The information technology staff tended to use fairly aggressively for sharing information about their own
projects. The tax consultants in Washington, D.C. also used Lotus Notes as they monitored the behavior of
the Internal Revenue Service and the U.S. Congress, and disseminated tax advisories to ALPHA offices
around the country about shifting changes in tax legislation that might affect their clients (Mehler, 1992).
The line consultants, who were supposed to become Lotus Notes’ primary users, often seemed uninterested
in learning how to use Notes, readily gave up if they faced early frustrations with Notes, and, as a group did
not spend much time with it. The senior line consultants, who were partners in the firm, tended to be
modest “users”. The more numerous junior line consultants, called associates, were low “users.”
This outcome might puzzle technology enthusiasts, like the ALPHA VP, who hold a “user” view. An
“interactor”-focused view, in contrast, reveals more detail about the interactions of those who used and
those who did not use Notes. The partners, who had substantial job security, could afford to experiment
with Notes. Many of the information technology staff were technophiles who were also willing to work
with an interesting new application. The tax consultants, who were located in Washington D.C., had a
significant incentive to show that they were visible and valuable in the firm. Lotus gave them the ability, in
effect, to electronically publish their advice, and make it quickly available to many of the consultants
around the firm who wanted to read the Notes database. They hoped it would enhance their visibility, and
thus show that the Washington office was not just overhead, but an important contributing part of the firm.
6
A pseudonym for a large, international consulting firm.
25
It was not clear to the line consultants, however, how Notes help them interact with managers, clients and
other consultants. ALPHA -- and many other large consulting firms in North America -- reviews its
consultants every two years, for “up or out” promotions. At major firms about half of the associates are
fired at each review, while the few consultants who are promoted up through the ranks to the status of
partners can expect annual incomes over $300,000. ALPHA’s associates were valued for their billable
hours, and were effectively required to bill almost all of their time. “Billable hours” means they have an
account that they can charge their time to. Consultants who wanted to use Notes had to have an account to
charge their time against, and the initial learning time was in the order of 20 to 30 hours. In 1991, the
consultants were billed at about $150 an hour, so they had to find a client who would be willing to pay
$3,000 to $4,500 for them to learn a system whose value wasn’t yet clear to them -- there were no
exemplary demonstrations showing them how other successful line consultants used Notes. Consequently,
relatively few associates saw value in Notes.
Ernst and Young (E&Y), another major consulting firm, implemented Notes very differently. E & Y’s
organizational charter was to organize consultants’ know-how in specific high profile areas. By 1997,
E&Y had developed 22 cross-office networks of consultants with expertise about certain industries,
organizational reforms, and technologies that were a focus of E&Y’s business (Davenport, 1997; Gierkink
and Ruggles, n.d.). Each network was assigned one line consultant, on a short term half-time basis, to
codify in Notes databases the group's insights from specific consulting projects, to prompt line consultants
to add their own insights, and to edit and prune a project’s discussion and document databases. Some
developed topical "Power Packs" in Notes -- structured and filtered sets of online materials, including sales
presentations and proposal templates. Davenport (1997) observed that these “knowledge networkers”
became network domain experts whose consulting services were in demand throughout the firm, and that
Lotus Notes served as their information support system.
The case of E&Y illustrates an important idea – an idea we might call “interactive design” – that is,
conceptualizing the design of computer and networked systems as a set of interrelated decisions about
26
technology and the organization of work. Unfortunately, thinking and talking about computerization as the
development of new interactions rather than as simply installing and using a new technology is not
commonplace. It is common for managers and technologists to discuss some social repercussions of new
technologies, such as the sponsorship of projects, training people to use new systems, and controls over
access to information. However, these discussions usually treat all or most social interactions as separable
from the technologies, whereas the E&Y case suggests how a more integrated “interactor”-focused view is
critical.
6.2 Going beyond “users” and expanding “IT”
Network society scale expansion and reduction dynamics generate some powerful cultural contradictions,
such as those noted by Bell (1973, 1976) in terms of globalized/local and localized/global interactions –
profoundly reshaping national, cultural and personal identities. “The new power lies in the codes of
information and in the images of representation around which societies organize their institutions, and
people build their lives, and decide their behavior. The sites of this power are people’s minds” (Castells,
1997, p. 359.) “People increasingly organize their meaning not around what they do but on the basis of
what they believe they are” (p. 8, 1997.) People don’t believe they are “users.” They don’t think of
themselves or refer to themselves as “users.”
E & Y managers were able to effect a successful Notes implementation, because they thought about
“interactors” rather than “users.” Perhaps the rest of the IS community can go beyond “users” by dropping
the term “user” from information systems development vocabularies. “The power of words is not total, but
they may subtly and indirectly inhibit the adoption of new areas of research and approaches to
development” (Grudin, 1990b p. 269.) Based on the works we have cited, it seems clear that the term
“user” has helped to reinforce the “user” concept, and we believe it should be replaced by more specific
labels. As a first step toward adopting the “interactor” concept, we invite IS researchers to radically reduce
their use of the term “user” -- only resorting to it when no other role or term, such as “social interactor,” is
workable. We don’t expect people to simply perform a mental “search-and-replace” operation. In our
27
MIS Quarterly article review, we noticed that several papers effectively avoid the term “user” by referring
to people by their role – e.g. managers, group members, clerical staff, nurses and librarians – and how they
interact with others in their work contexts. We have actually tried to follow this advice ourselves, but we
have sometimes slipped back to using the term “user.” Nevertheless, this exercise is effective: when we try
to eliminate the term “user” we have to be more explicit about interactions among people, organizations
and their technologies. As Hirscheim et al. (1996) have pointed out, within the domains of IS development
change, language change is the least difficult to effect. Perhaps then a second, relatively easy step in going
beyond “users” would be to replace the commonly used expansion of the acronym “IT” (i.e. information
technologies) with one that is better suited to a network society: “interaction technologies.”
In closing, we would also invite IS colleagues to consider and discuss how your systems designs and design
concepts support and strategically enable organizations and their interactors—that is, we invite you to
engage in “interactive design.” One way to initiate that dialogue would be to continue the discussion about
electronic journals that attracted so much attention at the recent AMCIS conference. We know from our
own empirical research with enterprise-wide resource planning, that large scale change cannot be
understood through the aggregation of individualistic attitudes. Institutional change requires a viewpoint
that helps designers envision the whole system—to see that implementation occurs within networks of
consensus, like tenure committees, that shape the actions of individuals, like academic authors, more
strongly than their own preferences for easier and faster publishing venues. The “interactor” concept
provides a socially rich basis for examining exactly this type of change and for designing the kind of
electronic publishing system that can support dynamic organizations, like twenty-first century Universities,
and academic interactors, like ourselves.
Epilogue
Clearly, more can be said about organizational interactors than we were able to develop at length here. We
only touched on the idea that ICT use, when associated with the organization rather than the individual,
takes on a very different set of considerations. These require careful analysis of the various social actors
28
that may be involved as stakeholders in ICT use or non-use, and the ways in which each may obtain valueadded benefits from these technologies or from the reconfiguration of organizational alliances that support
ICT use. Our focus in this initial presentation of the "interactor" concept has been to indicate how the
concept of "user" is too limiting for developing an understanding of ICT use in a network society. In future
discussions, we expect to push this line of thinking further by extending the "interactor" concept to higher
levels of analysis, such as groups, organizations, and even networks.
29
Appendix: MIS Quarterly Article Contents Analysis
MISQ Article
Conceptual Focus
No Mention: IS/IT use was not a focus of the article
Individualistic Focus: IS/IT use characterized by "user"-based, task-based, cognitive perspective
Socially Thin Interaction: IS/IT use alludes to interactions, human actors, organizational economic goals
Socially Rich Interaction: IS/IT use discussion strongly interaction-focused, interorganizational concerns
Volume 20, Number 1, March, 1996
Issues and Concerns About Computer-Supported Meetings: The Facilitator's
Socially Thin Interaction
Perspective Fred Niederman, Catherine M. Beise, and Peggy M. Beranek
Determinants of Commitment to Information Systems Development: A Longitudinal
Individualistic Focus
Investigation Michael Newman and Rajiv Sabherwal
Measuring the Linkage Between Business and Information Technology Objectives
Individualistic Focus
Blaize Horner Reich and Izak Benbasat
An Empirical Examination of the Value of Creativity Support Systems on Idea
Individualistic Focus
Generation Brenda Massetti
Volume 20, Number 2, June, 1996
Productivity, Business Profitability, and Consumer Surplus: Three Different Measures No Mention
of Information Technology Value Lorin Hitt and Erik Brynjolfsson
Relational Development in Computer-Supported Groups
Socially Thin Interaction
Laku Chidambaram
Information Privacy: Measuring Individuals' Concerns About Organizational
Individualistic Focus
Practices H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke
Information Technology for Local Administration Support: The Governorates Project Socially Thin Interaction
in Egypt
Sarma R. Nidumolu, Seymour E. Goodman, Douglas R. Vogel, and Ann K. Danowitz
Key Issues in Information Systems Management: 1994-95 SIM Delphi Results
No Mention
James C. Brancheau, Brian D. Janz, and James C. Wetherbe
Volume 20, Number 3, September, 1996
The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer
Individualistic Focus
Abuse Judgments and Intentions Susan J. Harrington
Sustainable Collaboration: Managing Conflict and Cooperation in Interorganizational Socially Rich Interaction
Systems Kuldeep Kumar and Han G. van Dissel
Expert Systems Usage: Task Change and Intrinsic Motivation
Individualistic Focus
T. Grandon Gill
Measuring the Extent of EDI Usage in Complex Organizations: Strategies and
No Mention
Illustrative Examples Brenda Massetti and Robert W. Zmud
Teledemocracy: Using Information Technology to Enhance Political Work
Socially Thin Interaction
Pål Ytterstad, Sigmund Akselsen, Gunnvald Svendsen, and Richard T. Watson
Sustaining Process Improvement and Innovation in the Information Services
Socially Thin Interaction
Function: Lessons Learned at the Bose Corporation
Warren L. Harkness, William J. Kettinger, and Albert H. Segars
Volume 20, Number 4, December 1996
Change Agentry -- The Next IS Frontier
Socially Rich Interaction
M. Lynne Markus and Robert I. Benjamin
The Contribution of Shared Knowledge to IS Group Performance
Socially Thin Interaction
Kay M. Nelson and Jay G. Cooprider
Information Exchange and Use in Group Decision Making: You Can Lead a Group to Individualistic Focus
Information, but You Can't Make It Think
Alan R. Dennis
Computer-Based Monitoring: Common Perceptions and Empirical Results
Socially Rich Interaction
Joey F. George
30
MISQ Article
Conceptual Focus
No Mention: IS/IT use was not a focus of the article
Individualistic Focus: IS/IT use characterized by "user"-based, task-based, cognitive perspective
Socially Thin Interaction: IS/IT use alludes to interactions, human actors, organizational economic goals
Socially Rich Interaction: IS/IT use discussion strongly interaction-focused, interorganizational concerns
Controlling Prototype Development Through Risk Analysis
Socially Rich Interaction
Richard L. Baskerville and Jan Stage
Volume 21, Number 1, March 1997
Factors Affecting the Adoption of Open Systems: An Exploratory Study
No Mention
Patrick Y. K. Chau and Kar Yan Tam
Information Specificity and Environmental Scanning: An Economic Perspective
Individualistic Focus
Vivek Choudhury and Jeffrey L. Sampler
Business Process Change: A Study of Methodologies, Techniques, and Tools
No Mention
William J. Kettinger, James T.C. Teng, and Subashish Guha
Searching and Scanning: How Executives Obtain Information From Executive
Socially Thin Interaction
Information Systems Betty Vandenbosch and Sid L. Huff
Discovery and Representation of Causal Relationships in MIS Research: A
No Mention
Methodological Framework Byungtae Lee, Anitesh Barua, and Andrew B. Whinston
Volume 21, Number 2, June 1997
Communication Richness in Electronic Mail: Critical Social Theory and the
Socially Rich Interaction
Contextuality of Meaning Ojelanki Ngwenyama and Allen S. Lee
Can Humans Detect Errors in Data? Impact of Base Rates, Incentives, and Goals
Individualistic Focus
Barbara D. Klein, Dale L. Goodhue, and Gordon B. Davis
Measuring Information Systems Service Quality: Concerns on the Use of the
Socially Thin InteractionSERVQUAL Questionnaire
Thomas P. Van Dyke, Leon A. Kappelman, and Victor R. Prybutok
Measuring Information Systems Service Quality: Concerns for a Complete Canvas
Socially Thin InteractionLeyland F. Pitt, Richard T. Watson, and C. Bruce Kavan
Pragmatic Perspectives on the Measurement of Information Systems Service Quality
Socially Thin InteractionWilliam J. Kettinger and Choong C. Lee
Qualitative Research in Information Systems
No Mention
Michael D. Myers
Volume 21, Number 3, September 1997
Special Abstract for Three "History" Papers on MIS Research Methods
Socially Rich Interaction
Developing an Historical Tradition in MIS Research
Richard O. Mason, James L. McKenney, and Duncan G. Copeland
Personal Computing Acceptance Factors in Small Firms: A Structural Equation
Socially Thin Interaction
Model Magid Igbaria, Nancy Zinatelli, Paul Cragg, and Angele L. M. Cavaye
An Historical Method for MIS Research: Steps and Assumptions
Socially Rich Interaction
Richard O. Mason, James L. McKenney, and Duncan G. Copeland
Bank of America: The Crest and Trough of Technological Leadership
Socially Rich Interaction
James L. McKenney, Richard O. Mason, and Duncan G. Copeland
Volume 21, Number 4, December 1997
Effects of User Participation in Systems Development: A Longitudinal Field
Individualistic Focus
Experiment James E. Hunton and Jesse D. Beeler
Transformation of the IT Function at British Petroleum
Socially Thin Interaction
John Cross, Michael J. Earl, and Jeffrey L. Sampler
Building Change-Readiness Capabilities in the IS Organization: Insights From the
Individualistic Focus
Bell Atlantic Experience
Charles E. Clark, Nancy C. Cavanaugh, Carol V. Brown, and V. Sambamurthy
Redesigning the Customer Support Process for the Electronic Economy: Insights
Socially Thin Interaction
From Storage Dimensions
Omar A. El Sawy and Gene Bowles
31
MISQ Article
Conceptual Focus
No Mention: IS/IT use was not a focus of the article
Individualistic Focus: IS/IT use characterized by "user"-based, task-based, cognitive perspective
Socially Thin Interaction: IS/IT use alludes to interactions, human actors, organizational economic goals
Socially Rich Interaction: IS/IT use discussion strongly interaction-focused, interorganizational concerns
Gender Differences in the Perception and Use of E-Mail: An Extension to the
Individualistic Focus
Technology Acceptance Model
David Gefen and Detmar W. Straub
Volume 22, Number 1, March 1998
Success of Data Resource Management in Distributed Environments: An Empirical
No Mention
Investigation
Hemant Jain, K. Ramamurthy, Hwa-Suk Ryu, and Masoud Yasai-Ardekani
Modeling IT Ethics: A Study in Situational Ethics
Socially Thin Interaction
Debasish Banerjee, Timothy Paul Cronan, and Thomas W. Jones
Measuring Information Systems Service Quality: Lessons From Two Longitudinal
Socially Thin Interaction
Case Studies Richard T. Watson, Leyland F. Pitt, and C. Bruce Kavan
The Dependent Variable in Research Into the Effects of Creativity Support Systems:
Socially Thin Interaction
Quality and Quantity of Ideas Berend Wierenga and Gerrit H. van Bruggen
An Ounce of Preventative Research Design Is Worth a Ton of Statistical Analysis
Individualistic Focus
Cure Brenda Massetti
Volume 22, Number 2, June 1998
The Effects of Customizability and Reusability on Perceived Process and Competitive No Mention
Performance of Software Firms Sarma R. Nidumolu and Gary W. Knotts
Strategic Information Systems Planning Success: An Investigation of the Construct
No Mention
and Its Measurement Albert H. Segars and Varun Grover
Polarization and Persuasive Argumentation: A Study of Decision Making in Group
Individualistic Focus
Settings Maha El-Shinnawy and Ajay S. Vinze
The Merchant of Prato -- Revisited: Toward a Third Rationality of Information
Socially Rich Interaction
Systems Kuldeep Kumar, Han G. van Dissel, and Paola Bielli
Information Technology and Worker Composition: Determinants of Productivity in
Socially Thin Interaction
the Life Insurance Industry Chiara Francalanci and Hossam Galal
Volume 22, Number 3, September 1998
Desktop Videoconferencing: Experiences of Complete Users, Wary Users, and NonIndividualistic Focus
Users Jane Webster
Information Technology and the Nature of Managerial Work: From the Productivity
Socially Rich Interaction
Paradox to the Icarus Paradox? Alain Pinsonneault and Suzanne Rivard
A Theory of Task/Technology Fit and Group Support Systems Effectiveness
Individualistic Focus
Ilze Zigurs and Bonnie K. Buckland
An Investigation of Media Selection Among Directors and Managers: From "Self" to
Socially Thin Interaction
"Other" Orientation Patricia J. Carlson and Gordon B. Davis
An Empirical Investigation of Information Technology Sourcing Practices: Lessons
No Mention
From Experience
Mary C. Lacity and Leslie P. Willcocks
Volume 22, Number 4, December 1998
Computer-Aided Systems and Communities:
Socially Rich Interaction
Mechanisms for Organizational Learning in Distributed Environments
Paul S. Goodman and Eric D. Darr
Coping With Systems Risk: Security Planning Models for Management Decision
Socially Thin Interaction
Making Detmar W. Straub and Richard J. Welke
Uses and Consequences of Electronic Markets: An Empirical Investigation in the
Socially Thin Interaction
Aircraft Parts Industry
Vivek Choudhury, Kathleen S. Hartzel, and Benn R. Konsynski
Redesigning Reengineering Through Measurement-Driven Inference
No mention
Mark E. Nissen
32
MISQ Article
Conceptual Focus
No Mention: IS/IT use was not a focus of the article
Individualistic Focus: IS/IT use characterized by "user"-based, task-based, cognitive perspective
Socially Thin Interaction: IS/IT use alludes to interactions, human actors, organizational economic goals
Socially Rich Interaction: IS/IT use discussion strongly interaction-focused, interorganizational concerns
Production and Transaction Economies and IS Outsourcing: A Study of the U.S.
No Mention
Banking Industry
Soon Ang and Detmar W. Straub
Volume 23, Number 1, March 1999
Empirical Research in Information Systems: The Practice of Relevance
No Mention
Izak Benbasat and Robert W. Zmud
GIS for District-Level Administration in India: Problems and Opportunities
Socially Rich Interaction
Geoff Walsham and Sundeep Sahay
A Set of Principles for Conducting and Evaluating Interpretive Field Studies in
Socially Rich Interaction
Information Systems
Heinz K. Klein and Michael D. Myers
Structuring Time and Task in Electronic Brainstorming
Individualistic Focus
Alan R. Dennis, Jay E. Aronson, William G. Heninger, and Edward D. Walker II
Ethics and Information Systems: The Corporate Domain
Socially Rich Interaction
H. Jeff Smith and John Hasnas
Volume 23, Number 2, June 1999
Social Cognitive Theory and Individual Reactions to Computing Technology: A
Individualistic Focus
Longitudinal Study
Deborah Compeau, Christopher A. Higgins, and Sid Huff
The Implications of Information Technology Infrastructure for Business Process
No Mention
Redesign Marianne Broadbent, Peter Weill, and Don St.Clair
Information Technology Adoption Across Time: A Cross-Sectional Comparison of
Socially Thin Interaction
Pre-Adoption and Post-Adoption Beliefs
Elena Karahanna, Detmar W. Straub, and Norman L. Chervany
The Untapped Potential of IT Chargeback
Socially Rich Interaction
Jeanne W. Ross, Michael R. Vitale, and Cynthia Mathis Beath
Creation of Favorable User Perceptions: Exploring the Role of Intrinsic Motivation
Individualistic Focus
Viswanath Venkatesh
Arrangements for Information Technology Governance: A Theory of Multiple
No Mention
Contingencies V. Sambamurthy and Robert W. Zmud
Notes on classification:
We evaluated the Conceptual Focus of these articles by judging how strongly each article reflected the
“user” concept (defined elsewhere in this paper.) We made this determination, not only by looking for the
word “user,” but by examining how “users” were characterized in the article, and how the interactions of
the people that were mentioned, entered into each article’s discussion. The articles were not coded, but
each one was evaluated “in total” to have reflected one of three general perspectives:
 Individualistic Focus: IS/IT use characterized by "user"-based, task-based, cognitive perspective
 Socially Thin Interaction: IS/IT use alludes to interactions, human actors, organizational economic
goals
 Socially Rich Interaction: IS/IT use discussion strongly interaction-focused, interorganizational
concerns
Sample passages:
To help readers better understand these characterizations, we include a sample passage from articles which
reflect each of these three perspectives:
33
Individualistic Focus:
Can Humans Detect Errors in Data? Impact of Base Rates, Incentives, and Goals
Barbara D. Klein, Dale L. Goodhue, and Gordon B. Davis
“Of particular practical importance, these results suggest that prior studies that concluded that users of
information systems cannot be counted on to detect errors may have overgeneralized their results. Under
more general conditions, individuals can detect data errors and their error detection performance responds
to explicit goals and incentives in expected ways. More specifically, we have reproduced results found by
Ricketts (1990) but shown that these are representative of the special case where the error detection goal is
only implicit in the task. When error detection is an explicit goal, subjects respond by shifting their
response criteria and by devoting greater effort to the error detection task, thereby improving
discriminability.” p. 184
Socially Thin Interaction:
The Contribution of Shared Knowledge to IS Group Performance
Kay M. Nelson and Jay G. Cooprider
“IS group performance is conceptualized in two parts; operational performance and service performance.
These dimensions of performance capture two different aspects of IS performance; the “inward”
operational activities of production and development, and the “outward” service activities of customer
service (Berger, 1988; Cooprider, 1990). Operational performance is therefore operationalized as the
quality of the IS group’s work product, the ability of the IS group to meet its organizational commitments,
and the ability of the IS organization to meet its goals. Service performance is operationalized as the ability
of the IS group to react quickly to line needs, its responsiveness to the line group, and the contribution the
IS group has made to the line group’s success in meeting its strategic goals.” p. 418
Socially Rich Interaction:
Change Agentry -- The Next IS Frontier
M. Lynne Markus and Robert I. Benjamin
“Another advantage of the proactive advocate role is its emphasis on communication. In our research and
consulting, we have often been struck by the relatively infrequent communications between CIOs and
CEOs, between CIOs and the heads of other organizational units, between IS analysts and users, and so
forth. We have also heard frequent complaints about the IS function’s lack of credibility. We think these
two issues are related. One cannot be a successful advocate of major change without many, many
interactions and discussions with the change targets. To put it in sports language, change agentry is a
contact sport. According to the research literature (Bashein, 1994), credibility is often a side-effect of
frequent, pleasurable communication. Therefore, it seems quite likely that IS professional credibility
would improve substantially if IS specialists treated good communication with clients as their central role.”
p.398
34
References
See Appendix (MIS Quarterly articles 1996-1999.)
Baldwin, Nancy Sadler and Ronald E. Rice (1997.) “Information-seeking behavior of securities analysts:
Individual and institutional influences, information sources and channels, and outcomes,” Journal of
the American Society for Information Science, v48, n8, pp. 674-693.
Bannon, Liam J. (1991.) “From Human Factors to Human Actors: The Role of Psychology and HumanComputer Interaction Studies in Systems Design” in J. Greenbaum and M. Kyng (Eds.) Design at
work: Cooperative Design of Computer Systems. Hillsdale: Lawrence Erlbaum Associates, pp. 25-44.
Beath, Cynthia M. and Wanda J. Orlikowski (1994.) “The Contradictory Structure of Systems
Development Methodologies: Deconstructing the IS-User Relationship in Information Engineering,”
Information Systems Research, Dec. 1994, pp. 350-377.
Bell, Daniel (1973.) The Coming of Post-Industrial Society: A Venture in Social Forecasting. New York:
Basic Books.
Bell, Daniel (1976.) The Cultural Contradictions of Capitalism. NewYork: Basic Books.
Blomberg, J., L. Suchman and R. Trigg (1994.) “Reflections on a Work-Oriented Design Project,” in R.
Trigg, S. I. Anderson, and E. Dykstra-Erickson (eds.), PDC ’94: Proceedings of the Participatory
Design Conference (pp. 99-109.) Computer Professionals for Social Responsibility, Palo Alto, CA.
Blumenstyk, Goldie (1999.) “Colleges Object as Companies Put Class Notes on Web Sites,” Chronicle of
Higher Education, September 10, 1999.
Carroll, John M. and Mary Beth Rosson (1987.) “The Paradox of the Active User,” in John M. Carroll
(Ed), Interfacing Thought: Cognitive Aspects of Human-Computer Interaction, Cambridge, MA: The
MIT Press.
Castells, Manual (1989.) The Informational City: Information Technology, Economic Restructuring, and
the Urban-Regional Process. Oxford: Blackwell.
Castells, Manual (1996.) The Information Age: Economy, Society and Culture. Vol I: The Rise of the
Network Society. Oxford: Blackwell.
Castells, Manual (1997.) The Information Age: Economy, Society and Culture. Vol II: The Power of
Identity. Oxford: Blackwell.
Castells, Manual (1998.) The Information Age: Economy, Society and Culture. Vol III: End of Millenium.
Oxford: Blackwell.
Castells, Manual (2000.) "Universities and the Network Society," Invited Lecture March 23, 2000,
University of Hawaii, Manoa.
Clegg, Stewart R., 1990. Modern Organizations: Organization Studies in the Postmodern World, Sage
Publications, London.
Clement, A. (1994.) “Computing at Work: Empowering Action by ‘Low-Level Users’” in D. Schuler (ed.),
Communications of the ACM, Special Issue on Social Computing, January, 1994, Vol. 37, No. 1, pp. 53105.
35
Cooperrider, David L. and Suresh Srivastva (1987.) “Appreciative Inquiry in Organizational Life,” in
Research in Organizational Change and Development, Vol. 1, pp. 129-169.
Davidson, Elizabeth (1999.) "Joint Application Design (JAD) in Practice," Journal of Systems and
Software, 45, 215-223.
Davenport, Thomas (1997.) “Knowledge Management Case Study: Knowledge Management at Ernst &
Young.” http://www.bus.utexas.edu/kman/E&Y.htm
DiMaggio, Paul J. and Walter W. Powell (1991.)” Introduction” in W.W. Powell and P.J. DiMaggio (eds.)
The New Institutionalism in Organizational Analysis, Chicago: University of Chicago Press.
Drucker, Peter F. (1999.) “Beyond the Information Revolution,” Atlantic Monthly, October, 1999, pp. 4757.
Friedland, Roger and Robert R. Alford (1991.) “Bringing Society Back In: Symbols, Practices and
Institutional Contradictions,” in W.W. Powell and P.J. DiMaggio (eds.) The New Institutionalism in
Organizational Analysis, Chicago: University of Chicago Press.
Gasser, Les (1986.) “The Integration of Computing and Routine Work,” ACM Transactions on Office
Information Systems, 4(3)(July):205-225.
Gasson, Susan (1999.) “The Reality of User-Centered Design,” Journal of End User Computing, Vol. 11,
No. 4.
Gierkink, Tia and Rudy Ruggles (URL). “Leveraging Knowledge for Business Value: Creating Living
Knowledge Representations Through the Power of Communities.”
http://www.businessinnovation.ey.com/mko/html/levera.html
Granovetter, M.S. 1973. "The strength of weak ties", American Journal of Sociology, 78, 6 (1973), 13601380.
Grudin, Jonathan (1990a.) “The Computer Reaches Out: The Historical Continuity of Interface Design”,
CHI ’90 Conference Proceedings, Seattle, WA, April 1-5, 1990, pp. 261-276.
Grudin, Jonathan (1990b.) “interface,” in Proceedings of the Conference on Computer Supported
Cooperative Work,” Los Angeles, CA, October 7-10, 1990, pp. 269-278.
Hirschheim, Rudy, Heinz K. Klein, and Kalle Lyytinen (1996.) “Exploring the Intellectual Structures of
Information Systems Development: A Social Action Theoretic Analysis,” Accounting Management
and Information Technology, Vol. 6, No. 1 / 2, pp. 1-64.
Igbaria, Magid, Nancy Zinatelli, Paul Cragg and Angele L. M. Cavaye (1997.) “Personal Computing
Acceptance Factors in Small Firms: A Structural Equation Model”, MIS Quarterly, Vol. 21, No. 3.
Kling, Rob (1977.) “The Organizational Context of User-Centered Organizational Design,” MIS Quarterly,
Vol. 1 No. 4, pp.41-52.
Kling, Rob (1987.) “Defining the Boundaries of Computing Across Complex Organizations" in R. Boland
and R. Hirschheim (eds.), Critical Issues in Information Systems, New York: John Wiley.
Kling, Rob (1992.) “Behind the Terminal: The Critical Role of Computing Infrastructure in Effective
Information Systems’ Development and Use,” in William Cotterman and James Senn (eds.),
Challenges and Strategies for Research in Systems Development, New York: John Wiley, pp. 153-201.
Kling, Rob. (1999.) “What is Social Informatics and Why Does it Matter?” D-Lib Magazine. January.
36
Kling, Rob and Covi, Lisa, (1995). "Electronic Journals and Legitimate Media in the Systems of Scholarly
Communication", The Information Society, 11(4).
Kling, Rob and Margaret Elliott (1994.) “Digital Library Design for Usability,” Digital Libraries ’94
Conference.
Kling, Rob and Roberta Lamb (1999.) “IT and Organizational Change in Digital Economies: A SocioTechnical Approach,” Understanding the Digital Economy -- Data, Tools and Research, May 25-26 at
the U.S. Department of Commerce, Washington D.C. (http://www.ecommerce.gov/schedule.htm).
Krackhardt, D., 1992. "The Strength of Strong Ties: The Importance of Philos in Organizations", in Nohria,
N. and Eccles, R.G (eds) Networks and Organizations: Structure, Form and Action., Boston: Harvard
Business School Press, 216-239.
Kumar, Kuldeep, Han G. van Dissel and Paola Bielli (1998.) “The Merchant of Prato—Revisited: Toward a
Third Rationality of Information Systems,” MIS Quarterly, June, 1998, Vol. 22, No. 2, pp. 199-226.
Lamb, Roberta (1997.) “Interorganizational Relationships and Information Services: How Technical and
Institutional Environments Influence Data Gathering Practices,” Unpublished Ph.D. Dissertation,
University of California, Irvine.
Lamb, Roberta and Elizabeth Davidson (forthcoming.) "The New Computing Archipelago: Intranet Islands
of Practice," in Proceedings of International Federation of Information Processing, Working Group 8.2,
June, 2000, Aalborg, Denmark.
Lamb, Roberta and John L. King (2000.) "Emerging Informational Environments: Technical and
Institutional Dimensions of Information and Communication Technology Use in Organizations," Working
Paper, University of Hawaii, Manoa.
Lawrence, P. R. and J. W. Lorsch (1967.) Organization and Environment, Cambridge: Harvard Graduate
School of Business Administration.
Malone, Thomas W. and Kevin Crowston (1990.) “What is Coordination Theory and How Can It Help
Design Cooperative Work Systems?” in Proceedings of the Conference on Computer Supported
Cooperative Work, Los Angeles, CA, October 7-10, 1990, pp. 357-370.
Markus, M. Lynne and Niels Bjorn-Andersen (1987.) “Power Over Users: Its Exercise by Systems
Professionals,” Communications of the ACM, June, 1987, Vol. 30, No. 6, pp. 498-504.
Mehler, Mark (1992). “Notes Fanatic”, Corporate Computing, (August) 1 (2):160-164.
Meyer, John W. and Brian Rowan (1977.) “Institutionalized Organizations: Formal Structure as Myth and
Ceremony,” American Journal of Sociology, 83:340-63.
Nardi, B. and J. Miller (1991.) “Twinkling Lights and Nested Loops: Distributed Problem Solving and
Spreadsheet Development,” International Journal of Man-Machine Studies, 34:161-184.
Norman, Don A. (1986.) “Cognitive Engineering” in D. A. Norman and S. W. Draper (Eds.), User-centered
system design, Hillsdale, NJ: Lawrence Erlbaum Associates.
O'Day, Vicki L. and Robin Jefferies, 1993. "Information Artisans: Patterns of Result Sharing By
Information Searchers", Proc. ACM Conference on Organizational Computing Systems (COOCS '93), New
York, ACM Press.
37
Olsen, Florence (1999.) “Armed With a Web Site and Links, a Professor Takes On Lecture-Notes
Companies,” [Need full cite.]
Pfeffer, J. (1981.) Power in Organizations, Marshfield, MA: Pittman.
Porter, Michael E. (1980.) Competitive Strategy, New York: Free Press.
Rogers, Everett M. (1962.) Diffusion of Innovations, New York: Free Press.
Shneiderman, Ben (1987.) Designing the User Interface: Strategies for Effective Human-Computer
Interaction, Reading MA: Addison-Wesley Publishing Co.
Simon, Herbert A. (1988.) The Sciences of the Artificial, Second Edition, Cambridge, MA: The MIT Press.
Singham, Mano (1999.) “Forget about making notes,” The Plain Dealer, September 13, 1999.
Suchman, Lucy (1987.) Plans and Situated Actions: The Problem of Human Machine Communication.
Cambridge: Cambridge University Press.
Suchman, Lucy (1996.) “Supporting Articulation Work” in Rob Kling (ed) Computerization and
Controversy: Value Conflicts and Social Choices, Second Edition, San Diego: Academic Press, pp.
407-423.
Todd, Peter and Isak Benbasat (1999.) “Evaluating the Impact of DSS, Cognitive Effort and Incentives On
Strategy Selection,” Information Systems Research, Vol. 10, No. 4.
von Hippel, Eric (1988.) The Sources of Innovation, New York: Oxford University Press.
von Hippel, Eric (1998.) "Economics of Product Development by Users: The Impact of 'Sticky' Local
Information," Management Science, Vol. 44, No. 5, pp. 629-644.
Walsham, Geoff and Sahay, Sundeep (1999.) "GIS for District-Level Administration in India: Problems
and Opportunities," MIS Quarterly, Vol. 23, No. 1, pp. 39-66.
Westrup, C. (1997.) “Constituting Users in Requirements Techniques” in Information Systems and
Qualitative Research, A. S. Lee et al. (eds.), London: Chapman & Hall, pp. 182-204.
Williamson, O. E. (1981.) “The Economics of Organization: The Transaction Cost Approach,” American
Journal of Sociology, 87 (November) 548-77.
Woolgar, S. (1991.) "Configuring the User: The Case of Usability Trials" in J. Law (ed), A Sociology of
Monsters: Essays on Power, Technology and Domination. London: Routledge.
38
Download