Organizational identity and information systems: how organizational ICT reflect who an organization is

The work reported here contributes to our understanding of organizational identity regarding its influence on organizational action related to the development of information and communications technologies (ICT). The empirical basis of this work comes from case studies of integrated criminal justice information systems (IJIS). IJIS are organizational and technological ensembles created to facilitate inter-organizational information sharing among criminal justice agencies. The focus of these case studies was to examine how organizational identity shapes organizational ICT. This research found that organizational identity shapes an organization’s ICT-related processes and is reflected in the material configurations of an organization’s ICT; and that organizations with different identities exhibit those differences in their ICT. Three implications of this research are that organizational identity serves as both an enabler and constraint on organizational ICT development; organizational identity commitments will likely serve as a barrier to large-scale integration of different organizations’ systems; organizational identity is relatively static and difficult to change.

[1]  Wanda J. Orlikowski,et al.  Learning from Notes: organizational issues in groupware implementation , 1992, CSCW '92.

[2]  Gerardine DeSanctis,et al.  Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory , 1994 .

[3]  B. Gray,et al.  Bargaining Power, Management Control, and Performance in United States-China Joint Ventures: A Compa , 1994 .

[4]  W. Staples Policing Contingencies , 2004 .

[5]  Roderick M. Kramer,et al.  Members' Responses to Organizational Identity Threats: Encountering and Countering the Business Week Rankings , 1996 .

[6]  Kevin G. Corley,et al.  Organizational Identity, Image, and Adaptive Instability , 2000 .

[7]  Rhonda K. Reger,et al.  REFRAMING THE ORGANIZATION: WHY IMPLEMENTING TOTAL QUALITY IS EASIER SAID THAN DONE , 1994 .

[8]  M. Tremblay The Key Informant Technique: A Nonethnographic Application , 1957 .

[9]  Kalle Lyytinen,et al.  The dynamics of IT boundary objects, information infrastructures, and organisational identities: the introduction of 3D modelling technologies into the architecture, engineering, and construction industry , 2008, Eur. J. Inf. Syst..

[10]  R. Baldwin Technology's Impact on Faculty Life and Work , 1998 .

[11]  Olof Brunninge Organisational Self-understanding and the Strategy Process : Strategy Dynamics in Scania and Handelsbanken , 2005 .

[12]  W. P. Barnett,et al.  MODELING INTERNAL ORGANIZATIONAL CHANGE , 1995 .

[13]  W. Orlikowski Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000 .

[14]  Elaine Byrne,et al.  The role of identity in health information systems development: A case analysis from Mozambique , 2005 .

[15]  Caroline A. Bartel Social Comparisons in Boundary-Spanning Work: Effects of Community Outreach on Members' Organizational Identity and Identification , 2001 .

[16]  T. D. Wilson,et al.  Review of: Kling, R., Rosenbaum, H. & Sawyer, S. Understanding and communicating social informatics: a framework for studying and teaching the human contexts of information and communication technologies. Medford, NJ: Information Today, Inc., 2005 , 2006, Information Research.

[17]  M. Schultz,et al.  Responding to Organizational Identity Threats: Exploring the Role of Organizational Culture , 2006 .

[18]  Carol Stoak Saunders,et al.  Electronic window dressing: impression management with Websites , 2003, Eur. J. Inf. Syst..

[19]  Wanda J. Orlikowski,et al.  Learning from Notes: organizational issues in groupware implementation , 1992, CSCW '92.

[20]  Wanda J. Orlikowski,et al.  Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000, Theory in CSCW.

[21]  Yasmin Merali,et al.  The role of boundaries in knowledge processes , 2002, Eur. J. Inf. Syst..

[22]  Carsten Sørensen,et al.  Tales from the police: Rhythms of interaction with mobile technologies , 2005, Inf. Organ..

[23]  Frantz Rowe,et al.  Strategizing information systems-enabled organizational transformation: A transdisciplinary review and new directions , 2012, J. Strateg. Inf. Syst..

[24]  Mary Tripsas,et al.  Technology, Identity, and Inertia through the Lens of 'The Digital Photography Company' , 2008, Organ. Sci..

[25]  David A. Whetten,et al.  Albert and Whetten Revisited: Strengthening the Concept of Organizational Identity , 2006 .

[26]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[27]  Elena Karahanna,et al.  Antecedents of IS Strategic Alignment: A Nomological Network , 2009, Inf. Syst. Res..

[28]  A. Stinchcombe Information and Organizations , 2019 .

[29]  Lida Xu,et al.  Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.

[30]  Bongsug Chae,et al.  The surface of emergence in systems development: agency, institutions, and large-scale information systems , 2005, Eur. J. Inf. Syst..

[31]  M. Markus,et al.  The Magic Bullet Theory in IT-Enabled Transformation , 1997 .

[32]  Annemette Kjærgaard,et al.  Identity in information systems , 2009, ECIS.

[33]  L. Stern,et al.  Conducting Interorganizational Research Using Key Informants , 1993 .

[34]  Matthew R. Jones,et al.  Giddens's Structuration Theory and Information Systems Research , 2008, MIS Q..

[35]  Kevin G. Corley,et al.  Identity Ambiguity and Change in the Wake of a Corporate Spin-off , 2004 .

[36]  C. Speier,et al.  The Hidden Minefields in the Adoption of Sales Force Automation Technologies , 2002 .

[37]  D. Richman The Changing Boundaries between Federal and Local Law Enforcement , 1999 .

[38]  Wanda J. Orlikowski Learning from Notes: Organizational Issues in Groupware Implementation , 1993, Inf. Soc..

[39]  Gareth R. Jones,et al.  The role of information technology in the organization: a review, model, and assessment , 2001 .

[40]  Rob Kling,et al.  Reconceptualizing Users as Social Actors in Information Systems Research , 2003, MIS Q..

[41]  Marc Berg,et al.  Viewpoint Paper: Some Unintended Consequences of Information Technology in Health Care: The Nature of Patient Care Information System-related Errors , 2003, J. Am. Medical Informatics Assoc..

[42]  Jane Fedorowicz,et al.  A collaborative network for first responders: Lessons from the CapWIN case , 2007, Gov. Inf. Q..

[43]  Donald R. Cressey,et al.  The Criminal Violation of Financial Trust , 1950 .

[44]  Jeremy Rose,et al.  EVALUATING THE CONTRIBUTION OF STRUCTURATION THEORY TO THE INFORMATION SYSTEMS DISCIPLINE , 2001 .

[45]  Anthony M. Cresswell,et al.  Information systems development as emergent socio-technical change: a practice approach , 2005, Eur. J. Inf. Syst..

[46]  Jane Fedorowicz,et al.  The formation of inter-organizational information sharing networks in public safety: Cartographic insights on rational choice and institutional explanations , 2009, Inf. Polity.

[47]  Paul Shrivastava,et al.  Organizational Frames of Reference , 1984 .

[48]  Jane Fedorowicz,et al.  Design principles for public safety response mobilization , 2006, DG.O.

[49]  M. Diamond Organizational Identity , 1988 .

[50]  J. Dutton,et al.  Keeping An Eye on the Mirror: Image and Identity In Organizational Adaptation , 1991 .

[51]  Wanda J. Orlikowski,et al.  Technology and Institutions: What Can Research on Information Technology and Research on Organizations Learn from Each Other? , 2001, MIS Q..

[52]  Celia V. Harquail,et al.  Organizational images and member identification. , 1994 .

[53]  J. Dutton,et al.  KEEPING AN EYE ON THE MIRROR : IMAGE AND IDENTITY IN ORGANIZATIONAL ADAPTATION , 2005 .

[54]  W. S. Robinson The Logical Structure of Analytic Induction , 1951 .

[55]  Alison Mackey,et al.  A Social Actor Conception of Organizational Identity and Its Implications for the Study of Organizational Reputation , 2002 .

[56]  Davide Ravasi,et al.  We are what we do (and how we do it): Organizational technologies and the construction of organizational identity , 2010 .

[57]  Davide Ravasi,et al.  Key Issues in Organizational Identity and Identification Theory , 2003 .

[58]  Stephen M. Shortell,et al.  Beauty is in the Eye of the Beholder: The Impact of Organizational Identification, Identity, and Image on the Cooperative Behaviors of Physicians , 2002 .

[59]  P. Leonardi,et al.  What’s Under Construction Here? Social Action, Materiality, and Power in Constructivist Studies of Technology and Organizing , 2010 .

[60]  Table of Contents. , 2021, The FEBS journal.

[61]  Ping Wang,et al.  Chasing the Hottest IT: Effects of Information Technology Fashion on Organizations , 2010, MIS Q..

[62]  Blaize Horner Reich,et al.  IT alignment: what have we learned? , 2007, J. Inf. Technol..

[63]  B. Glaser The Constant Comparative Method of Qualitative Analysis , 1965 .

[64]  R. Yin Case Study Research: Design and Methods , 1984 .

[65]  Tom Postmes,et al.  More than a Metaphor: Organizational Identity Makes Organizational Life Possible , 2003 .

[66]  Leiser Silva,et al.  Fighting Against Windmills: Strategic Information Systems and Organizational Deep Structures , 2007, MIS Q..

[67]  Christine Nadel,et al.  Case Study Research Design And Methods , 2016 .

[68]  Daniel M. Cable,et al.  Organizational Identity and Firm Performance: What Happens When Leaders Disagree About "Who We Are?" , 2006, Organ. Sci..

[69]  Amanda Hoey,et al.  Techno-cops: information technology and law enforcement , 1998, Int. J. Law Inf. Technol..

[70]  Sten Jönsson Institutions and Organizations , 1997 .

[71]  Jane Fedorowicz,et al.  A taxonomy for public safety networks , 2007, DG.O.

[72]  Dennis A. Gioia,et al.  Identity, Image, and Issue Interpretation: Sensemaking during Strategic Change in Academia. , 1996 .

[73]  Kevin G. Corley,et al.  Guiding Organizational Identity Through Aged Adolescence , 2006 .

[74]  M. Lynne Markus,et al.  Technochange management: using IT to drive organizational change , 2004, J. Inf. Technol..

[75]  C. Hill,et al.  The Performance of Incumbent firms in the Face of Radical Technological Innovation , 2003 .