The Organizational Improvisation Landscape: Taking Stock and Looking Forward

2020 ◽  
Vol 47 (1) ◽  
pp. 288-316
Author(s):  
Michael P. Ciuchta ◽  
Jay O’Toole ◽  
Anne S. Miner

Over the past 25 years, scholars have produced a wide variety of organizational improvisation (OI) scholarship from multiple fields that has improved our understanding of the OI phenomenon. However, because of its complexity and the heterogeneity of approaches used to study it, OI remains challenging to grasp. This makes it difficult for scholars to understand the contributions of this literature both in terms of extant findings as well as potential gaps and future areas of inquiry. Accordingly, we take stock of the extant literature by reviewing 186 peer-reviewed scholarly articles on OI primarily from management and related fields such as entrepreneurship and marketing as well as other disciplines such as information systems and communications. We introduce an aggregate framework that emphasizes the sequential process of OI. We also identify specific theoretical and associated empirical gaps in each of the pre-, during, and post-phases of an OI episode. We specifically address questions surrounding the origination and content of initial improvisational actions, conceptual ambiguity regarding the prevalence of OI, and the confounding of causal factors that impact the outcomes following an OI episode.

Author(s):  
Luca Giustiniano ◽  
Lucia Marchegiani ◽  
Enzo Peruffo ◽  
Luca Pirolo

Many decisions on IS investments have made during the past 20 years but yet, the extant literature does not provide a clear understanding of the phenomenon of IS outsourcing. This chapter answers two main questions relevant to researchers and practitioners: 1) What are the main findings so far in IS outsourcing literature? 2) What do we still need to learn? Through a comprehensive review of the literature, the authors offer systematization of the body of knowledge on outsourcing, its implications on firms’ boundaries, and the theoretical challenges. The MIS perspective appears to be very present, both by considering technology as part of the external environment and by exploring IS and IT as areas for important sourcing decision. In conclusion, implications for managers are drawn.


2021 ◽  
pp. 1-21
Author(s):  
Antonis A. Ellinas

Abstract Interviews have been the basis for some of the greatest insights in many disciplines but have largely been on the backstage of comparative political inquiry. I first rely on bibliometric data to show the limited use of interviews in research published by major journals in the past 30 years. I then focus on how interviews are used to study a hard-to-reach population: far-right actors. Using the extant literature and reflecting on my field experience with far-right leaders and functionaries, I examine in detail how interviews help investigate this phenomenon; I analyse challenges related to interview access, rapport, analysis and ethics and offer remedies. I argue that comparativists using interviews need to address these challenges by explicating and reflecting on the process through which they collect interview data rather than solely focusing on the data itself.


Author(s):  
Bert Veenendaal

Developments in web mapping and web based geographic information systems (GIS) have evolved rapidly over the past two decades. What began as online map images available to a small group of geospatial experts and professionals has developed to a comprehensive and interactive web map based on integrated information from multiple sources and manipulated by masses of users globally. This paper introduces a framework that outlines the eras of web mapping and significant developments among those eras. From this framework, some of the influences and trends can be determined, particularly those in relation to the development of technologies and their relation to the growth in the number and diversity of users and applications that utilise web mapping and geospatial information online.


2012 ◽  
pp. 1554-1568
Author(s):  
Mark Leeney ◽  
João Varajão ◽  
António Trigo Ribeiro ◽  
Ricardo Colomo-Palacios

Information systems outsourcing is an indispensable tool in the management of information systems. The set of services contracted to outside suppliers, originally more limited to services of an operational nature, has expanded over the past two decades, and today there is a wide range of services subject to outsourcing. Among them are: the hiring of software development; maintenance of applications; services and communications networks; security of information systems; and many others. Depending on the nature of the services contracted and on the range that the contracting of services has on departments of information systems, the issues involved in project management vary considerably. This article presents the results of a survey conducted among large companies in the Republic of Ireland to characterize, among other things, the range of services that are most often outsourced. The results are relevant in the sense that not only do they enable a better understanding of the reality of information systems departments of large Irish companies, but also enable the management to focus attention on specific services.


2011 ◽  
pp. 750-772
Author(s):  
Phillip Olla ◽  
Joseph Tan

This chapter provides an overview of mobile personal health record (MPHR) systems. A Mobile personal health record is an eclectic application through which patients can access, manage, and share their health information from a mobile device in a private, confidential, and secure environment. Personal health records have evolved over the past three decades from a small card or booklet with immunizations recorded into fully functional mobile accessible portals, and it is the PHR evolution outside of the secure healthcare environment that is causing some concerns regarding privacy. Specifically, the chapter reviews the extant literature on critical evaluative components to be considered when assessing MPHR systems.


2019 ◽  
pp. 68-84
Author(s):  
Carolyn Hoyle ◽  
Mai Sato

This chapter examines the nature of applications for wrongful convictions that the Criminal Cases Review Commission receives and the kinds of issues raised by applicants. It highlights the potential flaws of applications presented to the Commission, such as those relating to investigations conducted by police and prosecutors. It also reviews the extant literature on the sources of wrongful conviction to explain the range of possible misconduct and legal, scientific, or human error that might lead to an applicant being wrongfully convicted, or to believing themselves to be so. A number of sex cases and ‘expert evidence’ cases are discussed to illustrate the fallibility of witnesses, vulnerable suspects, the fallibility of science and expert testimony, due process failures, and the pervasive influence of prejudice and fear. The chapter concludes with some reflections on the changing nature of wrongful convictions over the past decade or two.


2012 ◽  
Vol 25 (2) ◽  
pp. 22-33
Author(s):  
Pedro Sá Silva ◽  
Jorge Pinto ◽  
João Varajão ◽  
António Trigo ◽  
Isabel Bentes ◽  
...  

Information Systems in the past few years became a keystone of society. History shows that in some Information Systems one simple failure can lead to disproportioned economic and social damages. Initially used in structural systems, the theory of vulnerability searches for this type of failure. This theory identifies failures in which small damage can have disproportionate impact consequences in terms of the functionality of the whole system. To test and evaluate these failures injections and analyze the impacts of them in sensitive Information Systems, simulation provides an interesting approach. By mimicking systems and representing them through models, simulation studies an imitated system without disrupting the system itself. Simulation provides a safer approach to explore and test the system in damage scenarios without real consequences. This paper discusses the use of the theory of vulnerability in Information Systems simulation.


2011 ◽  
Vol 20 (01) ◽  
pp. 73-82
Author(s):  
M. Ball ◽  
C. Boyer ◽  
P. L. Elkin ◽  
K. Ishikawa ◽  
C. Jaffe ◽  
...  

SummaryTo celebrate over 30 years of health information systems’ (HIS) evolution by bringing together pioneers in the field, members of the next generation of leaders, and government officials from several developing nations in Africa to discuss the past, present, and future of HISs.Participants gathered in Le Franschhoek, South Africa for a 2 ½ day working conference consisting of scientific presentations followed by several concurrent breakout sessions. A small writing group prepared draft statements representing their positions on various topics of discussion which were circulated and revised by the entire group.Many new tools, techniques and technologies were described and discussed in great detail. Interestingly, all of the key themes identified in the first HIS meeting held over 30 years ago are still of vital importance today: Patient Centered design, Clinical User Support, Real-time Education, Human-computer Factors and Measuring Clinical User Performance, Meaningful use.As we continue to work to develop next-generation HISs, we must remember the lessons of the past as we strive to develop the solutions for tomorrow.


Author(s):  
Sue E. Kase ◽  
Frank E. Ritter

Because of their ability to enhance productivity, computers have become ubiquitous in the workplace. By the early 1990s the use of computers in the workplace reached a per capita penetration that the telephone took 75 years to achieve (Webster & Martocchio, 1992). During the past several decades, there has been both speculation and hard research related to the psychological effects of computer technology. More recently the role of attitudes towards computers in influencing the acceptance and use of computer-based management information systems (MIS) has been highlighted by a growing number of MIS researchers. Generally, these studies focus on the negative attitudes towards computers and concerns about the impact of MIS on individual performance in the workplace.


2011 ◽  
pp. 104-140 ◽  
Author(s):  
Cathy Urquhart

The purpose of this chapter is to explore the practical and philosophical issues of applying the grounded theory approach to qualitative research in Information Systems. Over the past decade, we have seen a substantial increase in qualitative research in general (Klein, Nissen and Hirschheim, 1991; Walsham, 1995; Markus, 1997; Myers, 1997; Myers and Walsham, 1998; Klein and Myers, 1999; Walsham and Sahay, 1999; Trauth and Jessup, 2000; Schultze, 2000) and also an increase in the use of grounded theory (Toraskar, 1991, Orlikowski, 1993, Urquhart, 1997, 1998, 1999a, 1999b; Adams and Sasse, 1999, Baskerville and Pries-Heje, 1999, Trauth, 2000). Over the past three years, the most frequent request I have had from postgraduates is for some insight into the ‘how-to’ of coding and grounded theory


Sign in / Sign up

Export Citation Format

Share Document