Beneficial Noncompliance and Detrimental Compliance: Expected Paths to Unintended Consequences

This paper explores the possibility that compliance and noncompliance to process specifications, software usage procedures, business rules, and best practices could be beneficial or detrimental. After introducing different types of compliance and noncompliance, it uses a simple 2 x 2 matrix to postulate four types of situations: beneficial compliance, detrimental compliance, beneficial noncompliance, and detrimental noncompliance. It provides examples that illustrate subcategories within all four possibilities, thereby bringing into question the common assumption that compliance is beneficial and noncompliance is detrimental. It presents a model that explains decisions related to intentions toward compliance and noncompliance. It concludes with implications for management and for systems analysis and design. An underlying theme throughout is that beneficial noncompliance and detrimental compliance can be viewed as expected paths to unintended consequences.

[1]  Albert Cherns,et al.  Principles of Sociotechnical Design Revisted , 1987 .

[2]  Marie-Claude Boudreau,et al.  Enacting Integrated Information Technology: A Human Agency Perspective , 2005, Organ. Sci..

[3]  Wanda J. Orlikowski,et al.  Improvising Organizational Transformation Over Time: A Situated Change Perspective , 1996, Inf. Syst. Res..

[4]  Manuel Wiesche,et al.  A Situational Perspective on Workarounds in IT-Enabled Business Processes: a Multiple Case Study , 2014, ECIS.

[5]  Steven L. Alter Work System Theory: Overview of Core Concepts, Extensions, and Challenges for the Future , 2013, J. Assoc. Inf. Syst..

[6]  Netta Iivari,et al.  Information technology and the first-line manager's dilemma: Lessons from an ethnographic study , 2009 .

[7]  T. Baker,et al.  Creating Something from Nothing: Resource Construction through Entrepreneurial Bricolage , 2005 .

[8]  I. Ajzen The theory of planned behavior , 1991 .

[9]  Steven L. Alter A Workaround Design System for Anticipating, Designing, and/or Preventing Workarounds , 2015, BMMDS/EMMSAD.

[10]  Helmut Krcmar,et al.  Why Managers Tolerate Workarounds - The Role of Information Systems , 2014, AMCIS.

[11]  Jos Aarts,et al.  Evaluating the medication process in the context of CPOE use: The significance of working around the system , 2011, Int. J. Medical Informatics.

[12]  David Johnson,et al.  Do Strikes and Work-to-Rule Campaigns Change Elementary School Assessment Results? , 2011 .

[13]  Robert M. Davison,et al.  Sharing Knowledge In Technology Deficient Environments: Individual Workarounds Amid Corporate Restrictions , 2013, ECIS.

[14]  W.M.P. van der Aalst,et al.  Business Process Management: A Comprehensive Survey , 2013 .

[15]  Stefanie Huber,et al.  Learning from organizational incidents: Resilience engineering for high‐risk process environments , 2009 .

[16]  BoudreauMarie-Claude,et al.  Enacting Integrated Information Technology , 2005 .

[17]  M. M. van Paassen,et al.  A Search for Meaning: A Case Study of the Approach-to-Landing , 2003 .

[18]  Diane M. Strong,et al.  Understanding Organization-Enterprise System Fit: A Path to Theorizing the Information Technology Artifact , 2010, MIS Q..

[19]  Tosha B. Wetterneck,et al.  Technology Evaluation: Workarounds to Barcode Medication Administration Systems: Their Occurrences, Causes, and Threats to Patient Safety , 2008, J. Am. Medical Informatics Assoc..

[20]  K. Eisenhardt Agency Theory: An Assessment and Review , 1989 .

[21]  Steven L. Alter,et al.  USF Scholarship: a digital repository @ Gleeson Library | Geschke Center , 2016 .

[22]  Karen Broadhurst,et al.  Children's services in the iron cage of performance management : street-level bureaucracy and the spectre of Švejkism , 2010 .

[23]  Dennis F. Galletta,et al.  Sharing knowledge , 2008, CACM.

[24]  J. Carroll Organizational Learning Activities in High‐hazard Industries: The Logics Underlying Self‐Analysis , 1998 .

[25]  J Sice Evaluating medication. , 1972, Lancet.

[26]  Ryan T. Wright,et al.  Communications of the Association for Information Systems , 2010 .

[27]  Pertti Vakkari,et al.  "I Did It My Way": Social workers as secondary designers of a client information system , 2013, Inf. Process. Manag..