A pragmatic approach to managing enterprise IT infrastructures in the era of consumerization and individualization of IT

IT managers take one of the passive, reactive, and pragmatic approaches in the face of important sociotechnical changes.With the rise of IT consumerization, the management of IT infrastructure requires a more pragmatic and holistic approach.A pragmatic approach directs our attention to interdependencies among technologies, people, and their work practices.This article presents seven principles that can serve as general guidelines for a pragmatic approach. Historically, organizations owned and controlled the information technologies (IT) their employees used: telephone, inter-office memos, mainframes and timesharing systems. Today, employees often want to use their own IT: not only personal smart phones and tablets, but also Twitter and Google Docs. This new trend can diversify and extend enterprise IT infrastructure, but leaves organizations struggling with technology uses that they cannot control. With the emergence of new technological paradigms in consumer markets and organizations, the management of IT infrastructure requires a more pragmatic and holistic approach that goes beyond simple technological considerations. In this paper, we present a three-part frameworktechnology, people and practicethat helps managers understand and mitigate these tensions. Drawing on two empirical studies of European executives and consultants form multiple management consulting firms, the paper further outlines changes taking place along the three aspects of the framework. It concludes by discussing three distinct approaches to the management of organizational IT infrastructure (passive, reactive, and pragmatic), and by offering greater insight regarding a pragmatic approach.

[1]  Walter Brenner,et al.  European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .

[2]  Diana G. Oblinger,et al.  Educating the Net Generation , 2005 .

[3]  Jeffrey M. Voas,et al.  BYOD: Security and Privacy Considerations , 2012, IT Professional.

[4]  Chrisanthi Avgerou,et al.  IT and organizational change: an institutionalist perspective , 2000, Inf. Technol. People.

[5]  John Seely Brown,et al.  From Push To Pull: Emerging Models For Mobilizing Resources , 2008 .

[6]  Shahper Vodanovich,et al.  Research Commentary - Digital Natives and Ubiquitous Information Systems , 2010, Inf. Syst. Res..

[7]  Thomas W. Malone,et al.  The Dawn of the E-Lance Economy , 1998, Wirtschaftsinformatik.

[8]  W. Orlikowski Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000 .

[9]  David Sundaram,et al.  Design of Organisational Ubiquitous Information Systems: Digital Native and Digital Immigrant Perspectives , 2013, PACIS.

[10]  Jeff Hyman,et al.  Lacking balance? Work-life employment practices in the modern economy , 2004 .

[11]  Björn Niehaves,et al.  AIS Electronic , 2017 .

[12]  Wanda J. Orlikowski,et al.  Technology and Institutions: What Can Research on Information Technology and Research on Organizations Learn from Each Other? , 2001, MIS Q..

[13]  Emily You,et al.  Using social media to recruit global supply chain managers , 2014 .

[14]  Morten T. Hansen,et al.  The Search-Transfer Problem: The Role of Weak Ties in Sharing Knowledge across Organization Subunits , 1999 .

[15]  Hormazd Romer,et al.  Best practices for BYOD security , 2014 .

[16]  Aurélie Leclercq-Vandelannoitte,et al.  Managing BYOD: how do organizations incorporate user-driven IT innovations? , 2015, Inf. Technol. People.

[17]  D. Krackhardt,et al.  Activating Cross-Boundary Knowledge: The Role of Simmelian Ties in the Generation of Innovations , 2010 .

[18]  James D. McKeen,et al.  Developments in Practice XXXII: Successful Strategies for IT Staffing , 2009, Communications of the Association for Information Systems.

[19]  Steve Sawyer,et al.  Social Technologies, Informal Knowledge Practices, and the Enterprise , 2013, J. Organ. Comput. Electron. Commer..

[20]  Diana G. Oblinger Boomers, Gen-Xers, and Millennials: Understanding the "New Students.". , 2003 .

[21]  Tim Morris,et al.  Variation in Organizational Form among Professional Service Organizations , 2006 .

[22]  Tom Costello,et al.  2013 Trends and Strategies , 2013 .

[23]  N. Carr IT doesn't matter , 2003, IEEE Engineering Management Review.

[24]  Matt Marx,et al.  Managing Creativity in Small Worlds , 2006 .

[25]  Terri L. Griffith,et al.  Information Technology and the Changing Fabric of Organization , 2007, Organ. Sci..

[26]  Penny Hagen,et al.  Balancing work, life and other concerns: a study of mobile technology use by Australian freelancers , 2006, NordiCHI '06.

[27]  ศุภกร จูฑะพล Grown Up Digital , 2015 .

[28]  Kalle Lyytinen,et al.  Research Commentary - Digital Infrastructures: The Missing IS Research Agenda , 2010, Inf. Syst. Res..

[29]  Kelly L. Frey Generation Blend: Managing across the Technology Age Gap by Rob Salkowitz , 2011 .

[30]  Aurélie Leclercq-Vandelannoitte Leaving employees to their own devices: new practices in the workplace , 2015 .

[31]  Andrew McAfee,et al.  Enterprise 2.0: New Collaborative Tools for Your Organization's Toughest Challenges , 2009 .

[32]  Albert L. Lederer,et al.  The effectiveness of strategic information systems planning under environmental uncertainty , 2006, Inf. Manag..

[33]  Ted Shelton Business Models for the Social Mobile Cloud: Transform Your Business Using Social Media, Mobile Internet, and Cloud Computing , 2013 .

[34]  Dale W. Callahan,et al.  Communication lessons from IT consultancies , 2003 .

[35]  Tung-Mou Yang,et al.  Information-sharing in public organizations: A literature review of interpersonal, intra-organizational and inter-organizational success factors , 2011, Gov. Inf. Q..

[36]  Gordon B. Davis,et al.  Anytime/anyplace computing and the future of knowledge work , 2002, CACM.

[37]  Kulwinder Singh,et al.  Effective use of social media for talent acquisition and recruitment , 2014 .

[38]  Thomas H. Davenport,et al.  Process Innovation: Reengineering Work Through Information Technology , 1992 .

[39]  Bill Morrow,et al.  BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..

[40]  Julia Eisenberg,et al.  Overcoming the "Ideology of Openness": Probing the Affordances of Social Media for Organizational Knowledge Sharing , 2013, J. Comput. Mediat. Commun..

[41]  Steve Sawyer,et al.  Theorizing on the take‐up of social technologies, organizational policies and norms, and consultants' knowledge‐sharing practices , 2015, J. Assoc. Inf. Sci. Technol..

[42]  N. Howe,et al.  Millennials Rising: The Next Great Generation , 2000 .

[43]  Eoin Whelan,et al.  How twitter users can generate better ideas , 2015 .

[44]  William L. Smith,et al.  Age as a moderator of attitude towards technology in the workplace: work motivation and overall job satisfaction , 2012, Behav. Inf. Technol..

[45]  James Howison,et al.  Beyond the organizational 'container': Conceptualizing 21st century sociotechnical work , 2014, Inf. Organ..

[46]  Björn Niehaves,et al.  What Influences Technological Individualization? - An Analysis of Antecedents to IT Consumerization Behavior , 2013, AMCIS.

[47]  E. Burton Swanson,et al.  Innovating Mindfully with Information Technology , 2004, MIS Q..

[48]  Heiko Gewald,et al.  Determinants of Intention to Participate in Corporate BYOD-Programs – The Case of Digital Natives – , 2015 .

[49]  Enrique Castro-Leon Consumerization in the IT Service Ecosystem , 2014, IT Professional.

[50]  Gary Hamel,et al.  Moon shots for management. , 2009, Harvard business review.

[51]  David Sundaram,et al.  European Conference on Information Systems ( ECIS ) 5-2-2012 DIGITAL NATIVES AND DIGITAL IMMIGRANTS : TOWARDS A MODEL OF DIGITAL FLUENCY , 2013 .

[52]  Hsin Hsin Chang,et al.  Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator , 2011, Inf. Manag..

[53]  Andrew B. Hargadon,et al.  Technology brokering and innovation in a product development firm. , 1997 .

[54]  Aurélie Leclercq Vandelannoitte Managing BYOD: how do organizations incorporate user-driven IT innovations? , 2015 .

[55]  Sue Abdinnour-Helm,et al.  Pre-implementation attitudes and organizational readiness for implementing an Enterprise Resource Planning system , 2003, Eur. J. Oper. Res..

[56]  JoAnne Yates,et al.  The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals , 2013, Organ. Sci..

[57]  Jason Bennett Thatcher,et al.  What Cell Phones Mean in Young People's Daily Lives and Social Interactions , 2011 .

[58]  Rob Kling,et al.  IT and organizational change in digital economies: a socio-technical approach , 1999, CSOC.

[59]  Blake Ives,et al.  IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.

[60]  Jung P. Shim,et al.  Current Status, Issues, and Future of Bring Your Own Device (BYOD) , 2014, Commun. Assoc. Inf. Syst..

[61]  Laurence Clennett-Sirois It's Complicated: The Social Lives of Networked Teens , 2014 .

[62]  F. J. Armour,et al.  Mentoring for success , 1999 .

[63]  P. Duguid,et al.  Balancing act: how to capture knowledge without killing it. , 2000, Harvard business review.