1,304
Views
20
CrossRef citations to date
0
Altmetric
Theory Development

From sovereign IT governance to liberal IT governmentality? A Foucauldian analogy

&
Pages 326-346 | Received 30 Jun 2016, Accepted 12 Apr 2018, Published online: 05 Jun 2018

References

  • Abrahamsson, P., Conboy, K., & Wang, X. (2009). ‘Lots done, more to do’: The current state of agile systems development research. European Journal of Information Systems, 18(4), 281–284.
  • Alimam, M., Bertin, E., & Crespi, N. (2017). ITIL perspective on enterprise social media. International Journal of Information Management, 37(4), 317–326. Elsevier
  • Barnes, J. (ed.). (1984). Aristotle – The complete works of Aristotle. Princeton, NJ: Princeton University Press.
  • Bartha, P. (2013). Analogy and analogical reasoning. In Z. En (Ed.), The Stanford encyclopedia of philosophy. (Fall). http://plato.stanford.edu/archives/fall2013/entries/reasoning-analogy/
  • Baskerville, R. (2011a). Design theorizing individual information systems. Proceedings of the Pacific Asia Conference on Information Systems.
  • Baskerville, R. (2011b). Individual information systems as a research arena. European Journal of Information Systems, 20(3), 251–254.
  • Behrens, S. (2009). Shadow systems: The good, the bad and the ugly. Communications of the ACM, 52(2), 124–129.
  • Bernstein, E., Bunch, J., Canner, N., & Lee, M. (2016). Beyond the Holacracy Hype. Harvard Business Review, 94, 38–49.
  • Bertin, E., & Crespi, N. (2013). Architecture and governance of communication services. London: Wiley ISTE.
  • Besson, P., & Rowe, F. (2012). Strategizing information systems-enabled organizational transformation: A transdisciplinary review and new directions. The Journal of Strategic Information Systems, 21(2), 103–124.
  • Bharadwaj, A., El Sawy, O. A., Pavlou, P. A., & Venkatraman, N. V. (2013). Digital business strategy: Toward a next generation of insights. MIS Quarterly, 37(2), 471–482.
  • Bhattacherjee, A., & Park, S. C. (2014). Why end-users move to the cloud: A migration-theoretic analysis. European Journal of Information Systems, 23(3), 357–372.
  • Bingham, C. B., & Kahl, S. J. (2013). How to use analogies to introduce new ideas. MIT Sloan Management Review. Winter. Retrieved from http://sloanreview.mit.edu/article/how-to-use-analogies-to-introduce-new-ideas/.
  • Black, J. (2001). Decentring regulation: Understanding the role of regulation and self-regulation in a ‘post-regulatory’ world. Current Legal Problems, 54(1), 103.
  • Boden, M. (2004). The creative mind: Myths and mechanisms. New York: Routledge.
  • Boos, D., Guenter, H., Grote, G., & Kinder, K. (2013). Controllable accountabilities: The internet of things and its challenges for organisations. Behaviour & Information Technology, 32(5), 449–467.
  • Brown, A. E., & Grant, G. G. (2005). Framing the frameworks: A review of IT governance research. Communications of the Association for Information Systems, 15, 38.
  • Brown, C. V. (1997). Examining the emergence of hybrid IS governance solutions: Evidence from a single case site. Information Systems Research, 8(1), 69–95.
  • Camacho, T. D., Foth, M., & Rakotonirainy, A. (2013). Pervasive technology and public transport: Opportunities beyond telematics. IEEE Pervasive Computing, 12(1), 18–25.
  • CBS (2017, September 10). Hillary Clinton on why she lost and “the most important mistake” she made. Retrieved January 6, 2018, https://www.cbsnews.com/news/hillary-clinton-what-happened-sunday-morning-jane-pauley/
  • Ciborra, C. (1994). The grassroots of IT and strategy. In C. Ciborra & T. Jelassi (Eds.), Strategic information systems (pp. 3–24). Chichester: Wiley.
  • Clegg, S., Tyrone, S. P., Rura-Polley, T., & Marosszeky, M. (2002). Governmentality matters: Designing an alliance culture of inter-organizational collaboration for managing projects. Organization Studies, 23(3), 317–337.
  • Coltman, T., Tallon, P., Sharma, R., & Queiroz, M. (2015). Strategic IT alignment: Twenty-five years on. Journal of Information Technology, 30(2), 91–100.
  • Cornelissen, J., Holt, R., & Zundel, M. (2011). The role of analogy and metaphor in the framing and legitimization of strategic change. Organization Studies, 32(12), 1701–1716.
  • Crowston, K., Fitzgerald, B., Gloor, P., Schultze, U., & Yoo, Y. (2010). Shifting boundaries: How should IS researchers study non-organizational uses of ICT? ICIS 2010 Proceeding, St Louis, MO.
  • Cummings, J., Massey, A. P., & Ramesh, V. (2009). Web 2.0 proclivity: Understanding how personal use influences organizational adoption. 27th ACM international conference on design of communication. Bloomington.
  • Cunha, J. (2013). A dramaturgical model of the production of performance data. MIS Quarterly, 37, 723–748.
  • Davenport, T., & Prusak, L. (1997). Information ecology: Mastering the information and knowledge environment. New York, NY: Oxford University Press.
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
  • de Certeau, M. (1980). L’invention du quotidien, Arts de faire. Paris: Gallimard.
  • Delreal, J. A. (2015, July 24). Hillary Clinton on email controversy, Washington Post. Retrieved January 6, 2018, from https://www.washingtonpost.com/news/post-politics/wp/2015/07/24/hillary-clinton-on-e-mail-controversy-maybe-the-heat-is-getting-to-everybody/?utm_term=.45d908a6671d
  • Desanctis, G., & Poole, M. S. (1994). Capturing the complexity in advanced technology use: Adaptative structuration theory. Organization Science, 5(2), 121–146.
  • Ebling, M. R. (2016). IoT: From sports to fashion and everything in-between. IEEE Pervasive Computing, 15(4), 2–4.
  • Favela, J., Kaye, J., Skubic, M., Rantz, M., & Tentori, M. (2015). Living labs for pervasive healthcare research. IEEE Pervasive Computing, 14(2), 86–89.
  • Fernandez, E. B., Yoshioka, N., & Washizaki, H. (2015). Patterns for security and privacy in cloud ecosystems. IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).
  • Foucault, M. (1966). Les mots et les choses, Une archéologie des sciences humaines. Gallimard, coll. Paris: Bibliothèque des sciences humaines.
  • Foucault, M. (1970). The order of things: An archeology of the human sciences. New York: Pantheon Books.
  • Foucault, M. (1977). Discipline and Punish: The birth of the prison. London: Allen & Lane.
  • Foucault, M. (2007). Security, territory, population: Lectures at the Collège de France 1977–1978. Basingstoke: Palgrave Macmillan.
  • Foucault, M. (2008). The birth of biopolitics: Lectures at the Collège de France 1978–1979. Basingstoke: Palgrave Macmillan.
  • Fürstenau, D., & Rothe, H. (2014). Shadow IT systems: Discerning the good and the evil. Twenty Second European Conference on Information Systems (ECIS) Proceedings, Tel Aviv.
  • GARTNER, (2012) Gartner says the personal cloud will replace the personal computer as the center of users’ digital lives by 2014, Retrieved May 24, 2015, from http://www.gartner.com/it/page.jsp?id=1947315
  • Gay, D. U. (2000). Enterprise and its futures: A response to Fournier and Grey. Organization, 7(1), 165–183.
  • Gens, F., Levitas, D., & Segal, R. (2011). Consumerization of IT study: Closing the consumerization gap. Framingham, MA: IDC.
  • Gentner, D. (1983). Structure-mapping: A theoretical framework for analogy. Cognitive Science, 1, 155–170.
  • Gentner, D., & Holyoak, K. J. (1997). Reasoning and learning by analogy. American Psychologist, 52(1), 32–34.
  • Gentner, D., Holyoak, K. J., & Kokinov, B. (2001). The analogical mind. Cambridge: MIT Press.
  • Gentner, D. (1989). mechanisms of analogical reasoning. In S. Vosniadou & A. Ortony (eds.), Similarity and analogical reasoning (pp. 199–241). New York: Cambridge University Press.
  • Giddens, L., & Tripp, J. (2014). It’s my tool, i know how to use it: A theory of the impact of BYOD on device competence and job satisfaction. Twentieth Americas Conference on Information Systems, Savannah.
  • Hamel, G. (2011). First, let’s fire all the managers. Harvard Business Review, 89(12), 48–60.
  • Harris, J., Ives, B., & Junglas, I. (2011). The genie is out of the bottle: Managing the infiltration of consumer IT into the workforce, Accenture Institute for High Performance, Retrieved October 5, 2012, http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture-Managing-the-infiltration-of-Consumer-IT-into-the-workforce.pdf
  • Harris, J., Ives, B., & Junglas, I. (2012). IT consumerization: When gadgets turn into enterprise IT tools. MIS Quarterly Executive, 11, 3.
  • Hassan, N. R. (2011). Is information systems a discipline? Foucauldian and Toulminian insights. European Journal of Information Systems, 20(4), 456–476.
  • Hassan, N. R. (2014, Dec 14–17). Useful products in theorizing for information systems, International Conference for Information Systems (ICIS) proceedings, Auckland, NZ.
  • Hassan, N. R., Mingers, J., & Stahl, B. (2016). Call for papers: IS philosophy special issue, philosophy and the future of the IS field. European Journal of Information Systems, Retrieved May 24, 2016, https://secure.palgrave-journals.com/ejis/EJIS_IS_Philosophy_Special_Issue-v6a_Final_Copy.pdf.
  • Hekkala, R., & Urquhart, C. (2013). Everyday power struggles: Living in an IOIS project. European Journal of Information Systems, 22(1), 76–94.
  • Hesse, M. (1966). Models and analogies in science. Notre Dame: University of Notre Dame Press.
  • Hobbes, T. (1651). In I. Shapiro (Ed), Leviathan: Or the matter, forme, and power of a common-wealth ecclesiasticall and civill 2010. New Haven: Yale University Press.
  • Holland, J. H., Holyoak, K. J., Nisbett, R. E., & Thagard, P. R. (1986). Induction: Processes of inference, learning, and discovery. Cambridge: MIT Press.
  • Holyoak, K. J., & Thagard, P. (1997). The analogical mind. American Psychologist, 52(1), 35–44.
  • Huang, R., Zmud, R. W., & Price, L. R. (2010). Influencing the effectiveness of IT governance practices through steering committees and communication policies. European Journal of Information Systems, 19(3), 288–302.
  • Jackson, N., & Carter, P. (1998). Labour as dressage. In A. Mckinlay & K. Starkey (Eds), Foucault, management and organizational theory (pp. 49–64). London: Sage.
  • Jaffe, A., & Merica, D. (2015, March 11.). Hillary Clinton: I used one email “for convenience”. CNN, Retrieved January 6, 2018, http://edition.cnn.com/2015/03/10/politics/hillary-clinton-email-scandal-press-conference
  • Kallinikos, J., Aaltonen, A., & Marton, A. (2013). The ambivalent ontology of digital artifacts. MIS Quarterly, 37(2), 357–370.
  • Kang, C. (2017, January 25). That old phone Trump uses for Twitter could be an opening to security threats. The New York Times, Retrieved January 6, 2018, https://www.nytimes.com/2017/01/25/technology/donald-trump-phone-social-media-security.html
  • Knights, D., & Murray, F. (1994). Managers divided: Organizational politics and IT management. London: Wiley.
  • Koch, H., Zhang, S., Giddens, L., Milic, N., Yan, K., & Curry, P. (2014). Consumerization and IT department conflict. In Thirty Fifth International Conference on Information Systems (ICIS) proceedings, Auckland.
  • Köffer, S., Anlauf, L., Ortbach, K., & Niehaves, B. (2015a) The intensified blurring of boundaries between work and private life through IT consumerization. In 23rd European Conference on Information Systems (ECIS) proceedings, Münster, Deutschland.
  • Köffer, S., Ortbach, K., Junglas, I., Niehaves, B., & Harris, J. (2015b). Innovation through BYOD? – The influence of IT consumerization on individual IT innovation behavior. Business & Information Systems Engineering, 57(6), 363–375.
  • Laga, N., Bertin, E., Glitho, R., & Crespi, N. (2012). Widgets and composition mechanism for service creation by ordinary users. IEEE Communications Magazine, 50(3), 52–60.
  • Lairet, G., Rowe, F., & Geffroy, B. (2016). Understanding the undesirable effects of using interorganizational systems and integrated information systems: Case studies among supply chain partners. European Conference on Information Systems, Istanbul.
  • Law, J. (1991). Power, discretion and strategy. In J. Law (Ed.), A sociology of monsters, essays on power, technology and domination (pp. 165–191). London: Routledge.
  • Leclercq-Vandelannoitte, A. (2011). Organizations as discursive constructions: A Foucauldian approach. Organization Studies, 32(9), 1247–1271.
  • Leclercq-Vandelannoitte, A. (2015a). Managing BYOD: How do organizations incorporate user-driven IT innovations? Information Technology & People, 28(1), 2–33.
  • Leclercq-Vandelannoitte, A. (2015b). Leaving employees to their own devices: New practices in the workplace. Journal of Business Strategy, 36(5), 18–24.
  • Lee, M. Y., & Edmondson, A. C. (2017). Self-managing organizations: Exploring the limits of less hierarchical organizing, Research in organizational behavior. doi:10.1016/j.riob.2017.10.002
  • Leonardi, P. M. (2011). When flexible routines meet flexible technologies: Affordance, constraint, and the imbrication of human and material agencies. MIS Quarterly, 35(1), 147–168.
  • Levine, M. (2016, September 27). Why Hillary Clinton deleted 33,000 emails on her private email server. ABC News, Retrieved January 6, 2018, http://abcnews.go.com/Politics/hillary-clinton-deleted-33000-emails-secretary-state/story?id=42389308
  • Markus, M. L. (1983). Power, politics, and MIS implementation. Communications of the ACM, 26(6), 430–444.
  • Markus, M. L. (2014). Maybe not the king, but an invaluable subordinate: A commentary on Avison and Malaurent’s advocacy of ‘theory light’ IS research. Journal of Information Technology, 29(4), 341–345.
  • Markus, M. L., & Keil, M. (1994). If we build it, they will come: Designing information systems that people want to use. Sloan Management Review, 35(4), 11–25.
  • Markus, M. L., & Saunders, C. (2006). Editor’s comments, looking for a few good concepts and theories for the information systems field. MIS Quarterly, 31(1), iii–vi.
  • Martin, S., Liao, H., & Campbell, E. (2013). Directive versus empowering leadership: A field experiment comparing impacts on task proficiency and proactivity. Academy of Management Journal, 56(5), 1372–1395.
  • Mccord, P. (2014, January–February). How Netflix reinvented HR. Harvard Business Review, 92 (1-2), Retrieved July 2, 2016, https://hbr.org/2014/01/how-netflix-reinvented-hr.
  • Mingers, J., & Willcocks, L. (2004). Social theory and philosophy for information systems. England: Wiley.
  • Mirza, I. (2015, March 11). Hillary Clinton’s email challenge is actually a BYOD opportunity. LinkedIn, Retrieved January 6, 2018, https://www.linkedin.com/pulse/hillary-clinton-has-byod-problem-irfan-mirza
  • Morgan, G. (1986). Images of organization. Beverly Hills: Sage Publications.
  • Mueller, B., & Urbach, N. (2017). Understanding the Why, What, and How of theories in IS research. Communications of the Association for Information Systems, 41(17), 349–388.
  • Niehaves, B., Köffer, S., & Ortbach, K. (2012). IT consumerization – A theory and practice review. In Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, WA.
  • Nohr, A. (2012) The governmentalization of the state: Two questions of power. Available at: http://www.e-ir.info/2012/09/06/the-governmentalization-of-the-state-two-questions-of-power/.
  • Olson, M. H., & Chervany, N. L. (1980). The relationship between organizational characteristics and the structure of the information services function. MIS Quarterly, 54(2), 7–69.
  • ONLINE ETYMOLOGY DICTIONARY (n.d.). Anarchy. http://www.etymonline.com, accessed January 6, 2018.
  • Orlikowski, W. (1992). The duality of technology: Rethinking the concept of technology in organizations. Organization Science, 3(3), 398–427.
  • Orlikowski, W. (2000). Using technology and constituting structures: A practice lens for studying technology in organizations. Organization Science, 11(4), 404–428.
  • Orlikowski, W., & Hofman, J. D. (1997). An improvisational model for change management: The case of groupware technologies. Sloan Management Review, 38, 11–21.
  • Ortbach, K., Bode, M., & Niehaves, B. (2013). What Influences Technological Individualization? – An analysis of antecedents to IT consumerization behavior. In Proceedings of the Nineteenth Americas Conference on Information Systems, Chicago, IL.
  • Paiva, J., Morais, C., Costa, L., & Pinheiro, A. (2016). The shift from “e-learning” to “learning”: Invisible technology and the dropping of the “e”. British Journal of Educational Technology, 47, 226–238.
  • Rentrop, C., & Zimmermann, S. (2012). Shadow IT-management and control of unofficial IT. In Proceedings of the 6th International Conference on Digital Society (ICDS), pp. 98–102, Valencia, Spain.
  • Robertson, B. (2015). Holacracy: The new management system for a rapidly changing world. New York: Henry Holt and Company.
  • Rowe, F. (2012). Toward a richer diversity of genres in information systems research: New categorization and guidelines. European Journal of Information Systems, 21, 469–478.
  • Sambamurthy, V., & Zmud, R. W. (1999). Arrangements for Information technology governance: A theory of multiple contingencies. MIS Quarterly, 23(2), 261–291.
  • Schmitz, K., Teng, J., & Webb, K. (2016). Capturing the complexity of malleable IT use: Adaptive structuration theory for individuals. MIS Quarterly, 40(3), 663–686.
  • Schön, D. A. (1979). Generative Metaphor: A perspective on problem-setting in social policy. In A. Ortony (Ed.), Metaphor and thought. Cambridge: Cambridge University Press.
  • Silva, L., & Backhouse, J. (2003). The circuits-of-power framework for studying power in institutionalization of information systems. Journal of the Association for Information Systems, 4(6), 294–336.
  • Strong, D. M., & Volkoff, O. (2010). Understanding organization-enterprise system fit: A path to theorizing the information technology artifact. MIS Quarterly, 34(4), 731–756.
  • Suchman, L. A. A. (1987). Plans and situated actions – The problem of human-machine communication. Cambridge: Cambridge University Press.
  • Tran, S., & Bertin, E. (2015). Changing organizational models of IT departments as a result of cloud computing: Proposal for a typology. SI & Management, 20(4), 51–87.
  • Tsoukas, H. (1993). Analogical reasoning and knowledge generation in organization theory. Organization Studies, 14(3), 323–346.
  • Weick, K. (2001). Making sense of the organisation. Oxford, UK: Blackwell Publishers.
  • Weill, P. (2004). Don’t just lead govern: How top-performing firms govern IT. MIS Quarterly Executive, 3(1), 1–17.
  • Weill, P., & Ross, J. W. (2004). IT governance: How top performers manage IT decision rights for superior results. Watertown, MA: Harvard Business School Press.
  • Weill, P., & Ross, J. W. (2005). A matrixed approach to designing IT governance. Sloan Management Review, 46(2), 26–34.
  • Willcocks, L. (2006). Michel Foucault in the social study of ICTs – critique and reappraisal. Social Science Computer Review, 24(3), 274–295.
  • Willcocks, L. (2004). Foucault, power/knowledge and information systems: Reconstructing the present. In J. Mingers & L. Willcocks (Eds.), Social theory and philosophy for information systems (pp. 238–296). Chichester: Wiley.
  • Yan, J., Zhang, S., Koch, Milic, N, & Curry, P. (2016). IT Consumerization and New IT Practices: Discriminating, Firefighting and Innovating. In Proceedings of the 22nd Americas Conference on Information Systems, San Diego, CA.
  • Zachary, G. P. (2016). The invisible technology [spectral lines]. IEEE Spectrum, 53(11), 10-10. doi:10.1109/MSPEC.2016.7607011

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.