SlideShare a Scribd company logo
1 of 99
Chapter 9: The People in
Information Systems
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• describe each of the different roles that people play
in the design, development, and use of information
systems;
• understand the different career paths available to
those who work with information systems;
• explain the importance of where the information-
systems function is placed in an organization; and
• describe the different types of users of information
systems.
Introduction
The opening chapters of this text focused on the technology
behind
information systems, namely hardware, software, data, and
networking. The last chapter covered business processes and the
Chapter 9: The People in Information
Systems | 189
U. S. Bureau
of Labor
Statistics –
2020
Projections
key role they can play in the success of a business. This chapter
discusses people, the last component of an information system.
People are involved in information systems in just about every
way. People imagine information systems, people develop
information systems, people support information systems, and,
perhaps most importantly, people use information systems.
The Creators of Information Systems
The first group of people to be considered play a role in
designing,
developing, and building information systems. These people are
generally technical and have a background in programming,
analysis, information security, or database design. Just about
everyone who works in the creation of information systems has
a
minimum of a bachelor’s degree in computer science or
information
systems, though that is not necessarily a requirement. The
process
of creating information systems will be covered in more detail
in
Chapter 10.
The following chart shows the U. S. Bureau of Labor Statistics
projections for computing career employment in 2020.
190 | Information Systems for Business and Beyond (2019)
Systems Analyst
The systems analyst straddles the divide between identifying
business needs and imagining a new or redesigned system to
fulfill
those needs. This individual works with a team or department
seeking to identify business requirements and analyze the
specific
details of an existing system or a system that needs to be built.
Generally, the analyst is required to have a good understanding
of the business itself, the purpose of the business, the business
processes involved, and the ability to document them well. The
analyst identifies the different stakeholders in the system and
works
to involve the appropriate individuals in the analysis process.
Prior to analyzing the problem or the system of concern, the
analyst needs to a) clearly identify the problem, b) gain
approval for
the project, c) identify the stakeholders, and d) develop a plan
to
monitor the project. The analysis phase of the project can be
broken
down into five steps.
1. Seek out and identify the details
2. Specify requirements
3. Decide which requirements are most important
4. Create a dialog showing how the user interacts with the
existing system
5. Ask users to critique the list of requirements that have been
developed
The analysis phase involves both the systems analyst and the
users. It is important to realize the role the users take in the
analysis
of the system. Users can have significant insights into how well
the
current system functions as well as suggest improvements.
Once the requirements are determined, the analyst begins the
process of translating these requirements into an information
systems design. It is important to understand which different
technological solutions will work and provide several
alternatives
to the client, based on the company’s budgetary constraints,
Chapter 9: The People in Information Systems | 191
technology constraints, and culture. Once the solution is
selected,
the analyst will create a detailed document describing the new
system. This new document will require that the analyst
understand
how to speak in the technical language of systems developers.
The design phase results in the components of the new system
being identified, including how they relate to one another. The
designer needs to communicate clearly with software developers
as
well database administrators by using terminology that is
consistent
with both of these specialties. The design phase of the project
can
be broken down into six steps.
1. Design the hardware environment
2. Design the software
3. Design how the new system will interface with the users
4. Design hardware interfaces
5. Design database tables
6. Design system security
A systems analyst generally is not the one who does the actual
development of the information system. The design document
created by the systems analyst provides the detail needed to
create
the system and is handed off to a developer to actually write the
software and to the database administrator to build the database
and tables that will be in the database.
Sometimes the system may be assembled from off-the-shelf
components by a person called a systems integrator. This is a
specific type of systems analyst that understands how to get
different software packages to work with each other.
To become a systems analyst, you should have a background
both
in the business analysis and in systems design. Many analysts
first
work as developers and have business experience before
becoming
system analysts. It is vital for analysts to clearly understand the
purpose of the business of interest, realizing that all businesses
are
unique.
192 | Information Systems for Business and Beyond (2019)
Programmer/Developer
Programmers spend their time writing computer code in a
programming language. In the case of systems development,
programmers generally attempt to fulfill the design
specifications
given to them by a systems analyst/designer. Many different
styles
of software development exist A programmer may work alone
for
long stretches of time or work as part of a team with other
developers. A programmer needs to be able to understand
complex
processes and also the intricacies of one or more programming
languages.
Computer Engineer
Computer engineers design the computing devices that are used
every day. There are many types of computer engineers who
work
on a variety of different types of devices and systems. Some of
the
more prominent computer engineering jobs are as follows:
• Hardware engineer. A hardware engineer designs hardware
and test components such as microprocessors, memory
devices, routers, and networks. Many times, a hardware
engineer is at the cutting edge of computing technology,
creating something brand new. Other times, the hardware
engineer’s job is to re-engineer an existing component to work
faster or use less power. Many times a hardware engineer’s job
is to write code to create a program that will be implemented
directly on a computer chip.
• Software engineer. Software engineers tend to focus on a
specific area of software such as operating systems, networks,
applications, or databases. Software engineers use three
primary skill areas: computer science, engineering, and
mathematics.
Chapter 9: The People in Information Systems | 193
• Systems engineer. A systems engineer takes the components
designed by other engineers and makes them all work
together, focusing on the integration of hardware and
software. For example, to build a computer the mother board,
processor, memory, and hard disk all have to work together. A
systems engineer has experience with many different types of
hardware and software and knows how to integrate them to
create new functionality.
• Network engineer. A network engineer understands the
networking requirements of an organization and then designs
a communications system to meet those needs, using the
networking hardware and software, sometimes referred to as a
network operating system. Network engineers design both
local area networks as well as wide area networks.
There are many different types of computer engineers, and often
the job descriptions overlap. While many may call themselves
engineers based on a company job title, there is also a
professional
designation of “professional engineer” which has specific
requirements. In the United States each state has its own set of
requirements for the use of this title, as do different countries
around the world. Most often, it involves a professional
licensing
exam.
Information Systems Operations and
Administration
Another group of information systems professionals are
involved in
the day-to-day operations and administration of IT. These
people
must keep the systems running and up-to-date so that the rest
of the organization can make the most effective use of these
resources.
194 | Information Systems for Business and Beyond (2019)
Computer Operator
A computer operator is the person who oversees the mainframe
computers and data centers in organizations. Some of their
duties
include keeping the operating systems up to date, ensuring
available
memory and disk storage, providing for redundancy (think
electricity, connectivity to the Internet, and database backups),
and
overseeing the physical environment of the computer. Since
mainframe computers increasingly have been replaced with
servers,
storage management systems, and other platforms, computer
operators’ jobs have grown broader and include working with
these
specialized systems.
Database Administrator
A Database Administrator (DBA) is the person who designs and
manages the databases for an organization. This person creates
and
maintains databases that are used as part of applications or the
data warehouse. The DBA also consults with systems analysts
and
programmers on projects that require access to or the creation
of
databases.
Help Desk/Support Analyst
Most mid-size to large organizations have their own information
technology help desk. The help desk is the first line of support
for
computer users in the company. Computer users who are having
problems or need information can contact the help desk for
assistance. Many times a help desk worker is a junior level
employee
who is able to answer basic issues that users need assistance
with.
Help desk analysts work with senior level support analysts or
have a
Chapter 9: The People in Information Systems | 195
computer knowledgebase at their disposal to help them
investigate
the problem at hand. The help desk is a great place to break into
working in IT because it exposes you to all of the different
technologies within the company. A successful help desk
analyst
should have good communications skills and a sincere interest
in
helping users.
Trainer
A computer trainer conducts classes to teach people specific
computer skills. For example, if a new ERP system is being
installed
in an organization, one part of the implementation process is to
teach all of the users how to use the new system. A trainer may
work
for a software company and be contracted to come in to conduct
classes when needed; a trainer may work for a company that
offers
regular training sessions. Or a trainer may be employed full
time for
an organization to handle all of their computer instruction
needs.
To be successful as a trainer you need to be able to
communicate
technical concepts clearly and demonstrate patience with
learners.
Managing Information Systems
The management of information-systems functions is critical to
the success of information systems within the organization.
Here
are some of the jobs associated with the management of
information systems.
196 | Information Systems for Business and Beyond (2019)
CIO
The Chief Information Officer (CIO) is the head of the
information-
systems function. This person aligns the plans and operations of
the
information systems with the strategic goals of the organization.
Tasks include budgeting, strategic planning, and personnel
decisions for the information systems function. The CIO must
also
be the face of the IT department within the organization. This
involves working with senior leaders in all parts of the
organization
to ensure good communication, planning, and budgeting.
Interestingly, the CIO position does not necessarily require a lot
of technical expertise. While helpful, it is more important for
this
person to have good management skills and understand the
business. Many organizations do not have someone with the title
of CIO. Instead, the head of the information systems function is
called the Vice President of Information Systems or Director of
Information Systems.
Functional Manager
As an information systems organization becomes larger, many
of
the different functions are grouped together and led by a
manager.
These functional managers report to the CIO and manage the
employees specific to their function. For example, in a large
organization there are a group of systems analysts who report to
a manager of the systems analysis function. For more insight
into
how this might look, see the discussion later in the chapter of
how
information systems are organized.
Chapter 9: The People in Information Systems | 197
Gantt Chart
for
managing
projects
ERP Management
Organizations using an ERP require one or more individuals to
manage these systems. EPR managers make sure that the ERP
system is completely up to date, work to implement any changes
to
the ERP that are needed, and consult with various user
departments
on needed reports or data extracts.
Project Managers
Information systems projects are notorious for going over
budget
and being delivered late. In many cases a failed IT project can
spell
doom for a company. A project manager is responsible for
keeping
projects on time and on budget. This person works with the
stakeholders of the project to keep the team organized and
communicates the status of the project to management. Gantt
charts, shown above, are used to graphically illustrate a
project’s
schedule, tasks, and resources.
A project manager does not have authority over the project
team.
198 | Information Systems for Business and Beyond (2019)
Instead, the project manager coordinates schedules and
resources
in order to maximize the project outcomes. This leader must be
a
good communicator and an extremely organized person. A
project
manager should also have good people skills. Many
organizations
require each of their project managers to become certified as a
Project Management Professional (PMP).
Information Security Officer
An information security officer is in charge of setting
information
security policies for an organization and then overseeing the
implementation of those policies. This person may have one or
more
people reporting to them as part of the information security
team.
As information has become a critical asset, this position has
become
highly valued. The information security officer must ensure that
the
organization’s information remains secure from both internal
and
external threats.
Emerging Roles
As technology evolves many new roles are becoming more
common
as other roles diminish. For example, as we enter the age of
“big
data,” we are seeing the need for more data analysts and
business
intelligence specialists. Many companies are now hiring social
media experts and mobile technology specialists. The increased
use
of cloud computing and Virtual Machine (VM) technologies
also is
increasing demand for expertise in those areas.
Chapter 9: The People in Information Systems | 199
http://www.pmi.org/Certification/Project-Management-
Professional-PMP.aspx
Career Paths in Information Systems
(click to enlarge)
Career Paths in Information Systems
These job descriptions do not
represent all possible jobs
within an information systems
organization. Larger
organizations will have more
specialized roles, while smaller
organizations may combine
some of these roles. Many of
these roles may exist outside of
a traditional information-
systems organization, as we will
discuss below.
Working with information
systems can be a rewarding
career choice. Whether you
want to be involved in very
technical jobs (programmer,
database administrator), or you
want to be involved in working
with people (systems analyst, trainer, project manager), there
are
many different career paths available.
Many times those in technical jobs who want career
advancement
find themselves in a dilemma. A person can continue doing
technical work, where sometimes their advancement options are
limited, or become a manager of other employees and put
themselves on a management career track. In many cases those
proficient in technical skills are not gifted with managerial
skills.
Some organizations, especially those that highly value their
technically skilled employees, create a technical track that
exists in
parallel to the management track so that they can retain
employees
who are contributing to the organization with their technical
skills.
200 | Information Systems for Business and Beyond (2019)
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/Career-Paths.png
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/Career-Paths.png
CISCO certification badge
Sidebar: Are Certifications Worth Pursuing?
As technology becomes more important to businesses, hiring
employees with technical skills is becoming critical. But how
can
an organization ensure that the person they are hiring has the
necessary skills? Many organizations are including technical
certifications as a prerequisite for getting hired.
Cisco Certified Internetwork Expert.
Certifications are
designations given by a
certifying body that someone
has a specific level of
knowledge in a specific
technology. This certifying
body is often the vendor of the
product itself, though
independent certifying
organizations, such as
CompTIA, also exist. Many of these organizations offer
certification
tracks, allowing a beginning certificate as a prerequisite to
getting
more advanced certificates. To get a certificate, you generally
attend one or more training classes and then take one or more
certification exams. Passing the exams with a certain score will
qualify you for a certificate. In most cases, these classes and
certificates are not free. In fact a highly technical certification
can
cost thousands dollars. Some examples of the certifications in
highest demand include Microsoft (software certifications),
Cisco
(networking), and SANS (security).
For many working in IT, determining whether to pursue one or
more of these certifications is an important question. For many
jobs,
Chapter 9: The People in Information Systems | 201
http://certification.comptia.org/home.aspx
http://www.microsoft.com/learning/en/us/certification-
overview.aspx
http://www.cisco.com/web/learning/certifications/index.html
http://www.sans.org/
such as those involving networking or security, a certificate will
be
required by the employer as a way to determine which potential
employees have a basic level of skill. For those who are already
in
an IT career, a more advanced certificate may lead to a
promotion.
For those wondering about the importance of certification, the
best
solution is to talk to potential employers and those already
working
in the field to determine the best choice.
Organizing the Information Systems
Function
In the early years of computing, the information-systems
function
(generally called “data processing”) was placed in the finance
or
accounting department of the organization. As computing
became
more important, a separate information-systems function was
formed, but it still was generally placed under the Chief
Financial
Officer and considered to be an administrative function of the
company. By the 1980s and 1990s, when companies began
networking internally and then connecting to the Internet, the
information systems function was combined with the
telecommunications functions and designated as the Information
Technology (IT) department. As the role of information
technology
continued to increase, its place in the organization became more
important. In many organizations today, the head of IT (the
CIO)
reports directly to the CEO.
Where in the Organization Should IS Be?
Before the advent of the personal computer, the information
202 | Information Systems for Business and Beyond (2019)
systems function was centralized within organizations in order
to
maximize control over computing resources. When the PC began
proliferating, many departments within organizations saw it as a
chance to gain some computing resources for themselves. Some
departments created an internal information systems group,
complete with systems analysts, programmers, and even
database
administrators. These departmental IS groups were dedicated to
the information needs of their own departments, providing
quicker
turnaround and higher levels of service than a centralized IT
department. However, having several IS groups within an
organization led to a lot of inefficiencies. There were now
several
people performing the same jobs in different departments. This
decentralization also led to company data being stored in
several
places all over the company.
In some organizations a matrix reporting structure developed in
which IT personnel were placed within a department and
reported
to both the department management and the functional
management within IS. The advantages of dedicated IS
personnel
for each department must be weighed against the need for more
control over the strategic information resources of the company.
For many companies, these questions are resolved by the
implementation of the ERP system (see discussion of ERP in
Chapter
8). Because an ERP system consolidates most corporate data
back
into a single database, the implementation of an ERP system
requires organizations to find “silos” of data so that they can
integrate them back into the corporate system. The ERP allows
organizations to regain control of their information and
influences
organizational decisions throughout the company.
Outsourcing
Frequently an organization needs a specific skill for a limited
period
of time. Instead of training existing employees or hiring new
staff,
Chapter 9: The People in Information Systems | 203
it may make more sense to outsource the job. Outsourcing can
be
used in many different situations within the information systems
function, such as the design and creation of a new website or
the
upgrade of an ERP system. Some organizations see outsourcing
as a
cost-cutting move, contracting out a whole group or department.
New Models of Organizations
The integration of information technology has influenced the
structure of organizations. The increased ability to communicate
and share information has led to a “flattening” of the
organizational
structure due to the removal of one or more layers of
management.
The network-based organizational structure is another changed
enabled by information systems. In a network-based
organizational
structure, groups of employees can work somewhat
independently
to accomplish a project. People with the right skills are brought
together for a project and then released to work on other
projects
when that project is over. These groups are somewhat informal
and
allow for all members of the group to maximize their
effectiveness.
Information Systems Users – Types of Users
Besides the people who work to create, administer, and manage
information systems, there is one more extremely important
group
of people, namely, the users of information systems. This group
represents a very large percentage of an organization’s
employees.
If the user is not able to successfully learn and use an
information
system, the system is doomed to failure.
Technology adoption user types
204 | Information Systems for Business and Beyond (2019)
Diffusion of Innovation (click to
enlarge)
One tool that can be used to
understand how users will
adopt a new technology comes
from a 1962 study by Everett
Rogers. In his book, Diffusion of
Innovation,[1]Rogers studied
how farmers adopted new
technologies and noticed that
the adoption rate started slowly
and then dramatically
increased once adoption hit a
certain point. He identified five specific types of technology
adopters:
• Innovators. Innovators are the first individuals to adopt a new
technology. Innovators are willing to take risks, are the
youngest in age, have the highest social class, have great
financial liquidity, are very social, and have the closest contact
with scientific sources and interaction with other innovators.
Risk tolerance is high so there is a willingness to adopt
technologies thast may ultimately fail. Financial resources help
absorb these failures (Rogers, 1962, p. 282).
• Early adopters. The early adopters are those who adopt
innovation soon after a technology has been introduced and
proven. These individuals have the highest degree of opinion
leadership among the other adopter categories, which means
that these adopters can influence the opinions of the largest
majority. Characteristics include being younger in age, having a
higher social status, possessing more financial liquidity, having
advanced education, and being more socially aware than later
adopters. These adopters are more discrete in adoption
choices than innovators, and realize judicious choice of
adoption will help them maintain a central communication
position (Rogers, 1962, p. 283).
• Early majority. Individuals in this category adopt an
innovation
Chapter 9: The People in Information Systems | 205
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/diffusion-of-innovation.png
https://opentextbook.site/informationsystems2019/wp-
content/uploads/sites/3/2018/07/diffusion-of-innovation.png
after a varying degree of time. This time of adoption is
significantly longer than the innovators and early adopters.
This group tends to be slower in the adoption process, has
above average social status, has contact with early adopters,
and seldom holds positions of opinion leadership in a system
(Rogers, 1962, p. 283).
• Late majority. The late majority will adopt an innovation after
the average member of the society. These individuals approach
an innovation with a high degree of skepticism, have below
average social status, very little financial liquidity, are in
contact with others in the late majority and the early majority,
and show very little opinion leadership.
• Laggards. Individuals in this category are the last to adopt an
innovation. Unlike those in the previous categories, individuals
in this category show no opinion leadership. These individuals
typically have an aversion to change agents and tend to be
advanced in age. Laggards typically tend to be focused on
“traditions,” are likely to have the lowest social status and the
lowest financial liquidity, be oldest of all other adopters, and be
in contact with only family and close friends.[2]
These five types of users can be translated into information
technology adopters as well, and provide additional insight into
how
to implement new information systems within the organization.
For
example, when rolling out a new system, IT may want to
identify
the innovators and early adopters within the organization and
work
with them first, then leverage their adoption to drive the rest of
the
implementation to the other users.
Summary
In this chapter we have reviewed the many different categories
of individuals who make up the people component of
information
206 | Information Systems for Business and Beyond (2019)
systems. The world of information technology is changing so
fast
that new roles are being created all the time and roles that
existed
for decades are being phased out. This chapter this chapter
should
have given you a good idea and appreciation for the importance
of
the people component of information systems.
Study Questions
1. Describe the role of a systems analyst.
2. What are some of the different roles for a computer engineer?
3. What are the duties of a computer operator?
4. What does the CIO do?
5. Describe the job of a project manager.
6. Explain the point of having two different career paths in
information systems.
7. What are the advantages and disadvantages of centralizing
the
IT function?
8. What impact has information technology had on the way
companies are organized?
9. What are the five types of information-systems users?
10. Why would an organization outsource?
Exercises
1. Which IT job would you like to have? Do some original
research and write a two-page paper describing the duties of
the job you are interested in.
2. Spend a few minutes on Dice or Monster to find IT jobs in
your
area. What IT jobs are currently …
16 3
7
viRTual Te ams anD
ouTsouRCing
Introduction
Much has been written and published about virtual teams. Most
define virtual teams as those that are geographically dispersed,
although others state that virtual teams are those that primarily
inter-
act electronically. Technology has been the main driver of the
growth
of virtual teams. In fact, technology organizations, due mostly
to the
advent of competitive outsourcing abroad, have pushed
information
technology (IT) teams to learn how to manage across
geographical
locations, in such countries as India, China, Brazil, Ireland, and
many
others. These countries are not only physically remote but also
present
barriers of culture and language. These barriers often impede
commu-
nications about project status, and affect the likelihood of
delivering a
project on time, and within forecasted budgets.
Despite these major challenges, outsourcing remains attractive
due
to the associated cost savings and talent supply. These two
advantages
are closely associated. Consider the migration of IT talent that
began
with the growth of India in providing cheap and educated talent.
The
promise of cost savings caused many IT development
departments to
begin using more India-based firms. The ensuing decline in IT
jobs
in the United States resulted in fewer students entering IT
curricu-
lums at U.S. universities for fear that they would not be able to
find
work. Thus, began a cycle of lost jobs in the United States and
further
demand for talent abroad. Now, technology organizations are
faced
with the fact that they must learn to manage virtually because
the tal-
ent they need is far away.
From an IT perspective, successful outsourcing depends on
effec-
tive use of virtual teams. However, the converse is not true; that
is,
virtual teams do not necessarily imply outsourcing. Virtual
teams can
16 4 INFORMATION TECHNOLO GY
be made up of workers anywhere, even those in the United
States
who are working from a distance rather than reporting to an
office
for work. A growing number of employees in the United States
want
more personal flexibility; in response, many companies are
allow-
ing employees to work from home more often— and have found
the
experience most productive. This type of virtual team
management
generally follows a hybrid model, with employees working at
home
most of the time but reporting to the office for critical
meetings; an
arrangement that dramatically helps with communication and
allows
management to have quality checkpoints.
This chapter addresses virtual teams working both within the
United States and on an outsource basis and provides readers
with
an understanding of when and how to consider outsource
partners.
Chapter topics include management considerations, dealing with
multiple locations, contract administration, and in-house
alternatives.
Most important, this chapter examines organizational learning
as a
critical component of success in using virtual teams. Although
the
advent of virtual teams creates another level of complexity for
design-
ing and maintaining learning organizations, organizational
learning
approaches represent a formidable solution to the growing
dilemma of
how teams work, especially those that are 100% virtual.
Most failures in virtual management are caused by poor
communi-
cation. From an organizational learning perspective, we would
define
this as differences in meaning making— stemming mostly from
cul-
tural differences in the meaning of words and differing
behavioral
norms. There is also no question that time zone differences play
a role
in certain malfunctions of teams, but the core issues remain
commu-
nication related.
As stated, concerning the Ravell case study, cultural
transformation
is slow to occur and often happens in small intervals. In many
virtual
team settings, team members may never do more than
communicate
via e-mail. As an example, I had a client who was outsourcing
produc-
tion in China. One day, they received an e-mail stating, “ We
cannot
do business with you.” Of course, the management team was
confused
and worried, seeking to understand why the business
arrangement
was ending without any formal discussions of the problem. A
trans-
lator in China was hired to help clarify the dilemma. As it
turned
out, the statement was meant to suggest that the company
needed
16 5vIrtuAl te AMs And outsourCInG
to provide more business— more work, that is. The way the
Chinese
communicated that need was different from the Western
interpre-
tation. This is just a small example of what can happen without
a
well-thought-out organizational learning scheme. That is,
individuals
need to develop more reflective abilities to comprehend the
meaning
of words before they take action, especially in virtual
environments
across multiple cultures. The development of such abilities—
the
continual need for organizations to respond effectively to
dynamic
changes, brought about by technology, in this case, e-mail— is
consis-
tent with my theory of responsive organizational dynamism
(ROD).
The e-mail established a new dynamic of communication. Think
how
often specifications and product requirements are changing and
need
virtual teams to somehow come together and agree on how to
get the
work done— or think they agree.
Prior research and case studies provide tools and procedures as
ways
to improve productivity and quality of virtual team operations.
While
such processes and methodologies are helpful, they will not
necessar-
ily ensure the successful outcomes that IT operations seek
unless they
also change. Specifically, new processes alone are not sufficient
or a
substitute for learning how to better communicate and make
mean-
ing in a virtual context. Individuals must learn how to develop
new
behaviors when working virtually. We must also remember that
vir-
tual team operations are not limited to IT staffs. Business users
often
need to be involved as they would in any project, particularly
when
users are needed to validate requirements and test the product.
Status of Virtual Teams
The consensus tells us that virtual teams render results.
According to
Bazarova and Walther (2009), “ Virtual groups whose members
com-
municate primarily or entirely via email, computer
conferencing, chat,
or voice— have become a common feature of twenty-first
century
organizations” (p. 252). Lipnack and Stamps (2000) state that
virtual
teams will become the accepted way to work and will likely
reshape
the work world. While this prediction seems accurate, there has
also
been evidence of negative attribution or judgment about
problems that
arise in virtual team performance. Thus, it is important to
understand
how virtual teams need to be managed and how realistic
expectations
16 6 INFORMATION TECHNOLO GY
of such teams might be formed. So, while organizations
understand
the need for virtual teams, they are not necessarily happy with
proj-
ect results. Most of the disappointment relates to a lack of
individual
development that helps change the mindset of how people need
to
communicate, coupled with updated processes.
Management Considerations
Attribution theory “ describes how people typically generate
explana-
tions for outcomes and actions— their own and others”
(Bazarova &
Walther, 2009, p. 153). This theory explains certain behavior
patterns
that have manifested during dysfunctional problems occurring
in man-
aging virtual teams. Virtual teams are especially vulnerable to
such
problems because their limited interactions can lead to members
not
having accurate information about one another. Members of
virtual
teams can easily develop perceptions of each other’ s motives
that are
inaccurate or distorted by differing cultural norms. Research
also shows
us that virtual team members typically attribute failure to the
external
factors and successes to internal factors. Problems are blamed
on the
virtual or outside members for not being available or
accountable to the
physical community. The successes then tend to reinforce that
virtual
teams are problematic because of their very nature. This then
estab-
lishes the dilemma of the use of virtual teams and
organizations— its
use will continue to increase and dominate workplace structures
and
yet will present challenges to organizations that do not want to
change.
The lack of support to change will be substantiated during
failures in
expected outcomes. Some of the failures, however, can and
should be
attributable to distance. As Olson and Olson (2000) state: “
Distance
will persist as an important element of human experience” (p.
172). So,
despite the advent of technology, it is important not to ignore
the social
needs that teams need to have to be effective.
Dealing with Multiple Locations
Perhaps the greatest difficulty in implementing virtual teams is
the
reality that they span multiple locations. More often, these
locations
can be in different time zones and within multiple cultures. To
prop-
erly understand the complexity of interactions, it makes sense to
revisit
16 7vIrtuAl te AMs And outsourCInG
the organizational learning tools discussed in prior chapters.
Perhaps
another way of viewing virtual teams and their effects on
organiza-
tion learning is to perceive it as another dimension— a
dimension that
is similar to multiple layers in a spreadsheet. This notion means
that
virtual teams do not upset the prior relations between
technology as
a variable from a two-dimensional perspective, rather in the
depth
of how it affects this relationship in a third dimension. Figure
7.1
reflects how this dimension should be perceived.
In other words, the study of virtual teams should be viewed as
a subset of the study of organizations. When we talk about
work-
place activities, we need to address issues at the component
level. In
this example, the components are the physical organization and
the
Technology as an
independent
variable
Creates
Virtual organizational
dynamism dimension
Physical organizational
dynamism dimension
Virtual acceleration
dimension
Strategic
integration
Cultural
assimilation
Total
organizational
dynamism
Acceleration of events that
require different
infrastructures and
organizational processes
Virtual cultural
assimilation dimension
Virtual strategic
integration dimension
Figure 7.1 The three-dimensional ROD.
16 8 INFORMATION TECHNOLO GY
virtual organization. The two together make up the superset or
the
entire organization. To be fruitful, any discussion of virtual
organiza-
tions must be grounded in the context of the entire organization
and
address the complete topic of workplace learning and
transformation.
In Chapter 4, I discussed organizational learning in
communities of
practice (COP). In this section, I expand that discussion to
include
virtual organizational structures.
The growing use of virtual teams may facilitate the complete
inte-
gration of IT and non-IT workers. The ability to connect from
various
locations using technology itself has the potential to expand
COP.
But, as discussed in Chapter 4, it also presents new challenges,
most
of which relate to the transient nature of members, who tend to
par-
ticipate on more of a subject or transactional basis, rather than
being
permanent members of a group. Table 7.1 reflects some of the
key
differences between physical and virtual teams.
There has been much discussion about whether every employee
is
suited to perform effectively in a virtual community. The
consensus is
that effective virtual team members need to be self-motivated,
able to
work independently, and able to communicate clearly and in a
posi-
tive way. However, given that many workers lack some or all of
these
skills, it seems impractical to declare that workers who do not
meet
these criteria should be denied the opportunity to work in
virtual
Table 7.1 Operating Differences between Traditional and
Virtual Teams
TRADITIONAL OR PHYSICAL TEAMS VIRTUAL TEAMS
Teams tend to have fixed participation and
members.
Membership shifts based on topics and needs.
Members tend to be from the same
organization.
Team members can include people from outside
the organization (clients and collaborators).
Team members are 100% dedicated. Members are assigned to
multiple teams.
Team members are collocated geographically
and by organization.
Team members are distributed geographically and
by organization.
Teams tend to have a fixed term of
membership; that is, start and stop dates.
Teams are reconfigured dynamically and may
never terminate.
Teams tend to have one overall manager. Teams have multiple
reporting relationships with
different parts of the organization at different
times.
Teamwork is physical and practiced in
face-to-face interactions.
Teamwork is basically social.
Engagement is often during group events
and can often be hierarchical in nature.
Individual engagement is inseparable from
empowerment.
16 9vIrtuAl te AMs And outsourCInG
teams. A more productive approach might be to encourage
workers to
recognize that they must adapt to changing work environments
at the
risk of becoming marginal in their organizations.
To better understand this issue, I extended the COP matrix,
presented in Chapter 4, to include virtual team considerations in
Table 7.2.
Item 7 in Table 7.2 links the study of knowledge management
with
COP. Managing knowledge in virtual communities within an
orga-
nization has become associated directly with the ability of a
firm to
sustain competitive advantage. Indeed, Peddibhotla and
Subramani
(2008) state that “ virtual communities are not only recognized
as
important contributors to both the development of social
networks
among individuals but also towards individual performance and
firm
performance” (p. 229). However, technology-enabled facilities
and
support, while providing a repository for better documentation,
also
create challenges in maintaining such knowledge. The process
of how
information might become explicit has also dramatically
changed
with the advent of virtual team communications. For example,
much
technology-related documentation evolves from bottom-up
sources,
rather than the traditional top-down process. In effect, virtual
com-
munities share knowledge more on a peer-to-peer basis or
through
mutual consensus of the members. As a result, virtual
communities
have historically failed to meet expectations, particularly those
of
management, because managers tend to be uninvolved in
communi-
cation. While physical teams can meet with management more
often
before making decisions, virtual teams have no such contact
available.
To better understand the complexities of knowledge
management and
virtual teams, Sabherwal and Becerra-Fernandez (2005) expand
on
Nonaka’ s (1994) work on knowledge management, which
outlined
four modes of knowledge creation: externalization,
internalization,
combination, and socialization. Each of these modes is defined
and
discussed next.
Externalization
Externalization is the process of converting or translating tacit
knowl-
edge (undocumented knowledge) into explicit forms. The
problem with
this concept is whether individuals really understand what they
know
170 INFORMATION TECHNOLO GY
Table 7.2 Communities of Practice: Virtual Team Extensions
STEP
COMMUNITIES-OF-
PRACTICE STEP TECHNOLOGY EXTENSION VIRTUAL
EXTENSION
1 Understanding strategic
knowledge needs: What
knowledge is critical to
success.
Understanding how
technology affects
strategic knowledge and
what specific
technological knowledge
is critical to success.
Understanding how to
integrate multiple visions
of strategic knowledge and
where it can be found
across the organization.
2 Engaging practice
domains: Where people
form communities of
practice to engage in
and identify with.
Technology identifies
groups based on
business-related
benefits, requiring
domains to work together
toward measurable
results.
Virtual domains are more
dynamic and can be
formed for specific
purposes and then
reconfigured based on
practice needs of subjects
discussed.
3 Developing communities:
How to help key
communities reach their
full potential.
Technologies have life
cycles that require
communities to continue;
treats the life cycle as a
supporter for attaining
maturation and full
potential.
Communities can be
reallocated to participate
in multiple objectives.
Domains of discussion
have no limits to reach
organizational needs.
4 Working the boundaries:
How to link communities
to form broader learning
systems
Technology life cycles
require new boundaries
to be formed. This will
link other communities
that were previously
outside of discussions
and thus expand input
into technology
innovations.
Virtual abilities allow for
customer interfaces,
vendors, and other
interested parties to join
the community.
5 Fostering a sense of
belonging: How to
engage people’ s
identities and sense of
belonging.
The process of integrating
communities: IT and
other organizational
units will create new
evolving cultures that
foster belonging as well
as new social identities.
Communities establish
belonging in a virtual way.
Identities are established
more on content of
discussion than on
physical attributes of
members.
6 Running the business:
How to integrate
communities of practice
into running the
business of the
organization.
Cultural assimilation
provides new
organizational structures
that are necessary to
operate communities of
practice and to support
new technological
innovations.
The organization functions
more as a virtual
community or team, being
more agile to demands of
the business, and
interactions may not
always include all
members.
(Continued)
171vIrtuAl te AMs And outsourCInG
and how it might affect organizational knowledge. Virtual
communi-
ties have further challenges in that the repository of tacit
information
can be found in myriad storage facilities, namely, audit trails of
e-mail
communications. While Sabherwal and Becerra-Fernandez
(2005)
suggest that technology may indeed assist in providing the
infrastruc-
ture to access such information, the reality is that the challenge
is not
one of process but rather of thinking and doing. That is, it is
more a
process of unlearning existing processes of thinking and doing,
into
new modes of using knowledge that is abundantly available.
Internalization
Internalization is a reversal of externalization: It is the process
of
transferring explicit knowledge into tacit knowledge— or
individual-
ized learning. The individual thus makes the explicit process
into his
or her own stabilized thinking system so that it becomes
intuitive
in operation. The value of virtual team interactions is that they
can
provide more authentic evidence of why explicit knowledge is
valu-
able to the individual. Virtual systems simply can provide more
people
who find such knowledge useful, and such individuals, coming
from
a more peer relationship, can understand why their procedures
can be
internalized and become part of the self.
Combination
Combination allows individuals to integrate their physical
processes
with virtual requirements. The association, particularly in a
global
Table 7.2 (Continued) Communities of Practice: Virtual Team
Extensions
STEP
COMMUNITIES-OF-
PRACTICE STEP TECHNOLOGY EXTENSION VIRTUAL
EXTENSION
7 Applying, assessing,
reflecting, renewing: How
to deploy knowledge
strategy through waves
of organizational
transformation.
The active process of
dealing with multiple
new technologies that
accelerates the
deployment of knowledge
strategy. Emerging
technologies increase
the need for
organizational
transformation.
Virtual systems allow for
more knowledge strategy
because of the ability to
deploy information and
procedures. Tacit
knowledge is easier to
transform to explicit forms.
172 INFORMATION TECHNOLO GY
environment, allows virtual team members to integrate new
explicit
forms into their own, not by replacing their beliefs, but rather,
by
establishing new hybrid knowledge systems. This is particularly
advantageous across multiple cultures and business systems in
coun-
tries that hold different and, possibly complementary,
knowledge
about how things can get done. Nonaka’ s (1994) concept of
combina-
tion requires participants in the community to be at later stages
of
multiplicity— suggesting that this form can only be successful
among
certain levels or positions of learners.
Socialization
As Nonaka (1994) notes, individuals learn by observation,
imitation,
and practice. The very expansion of conversations via
technology
can provide a social network in which individuals can learn
simply
through discourse. Discourse, as I discussed in Chapter 4, is
the basis
of successful implementations of COP. The challenge in virtual
social
networks is the difficulty participants have in assessing the
authentic-
ity of the information provided by those in the community.
The four modes of knowledge management formulated by
Nonaka
(1994) need to be expanded to embrace the complexities of
virtual
team COPs. Most of the adjustments are predicated on the team’
s
ability to deal with the three fundamental factors of ROD that I
introduced in this book; that is, acceleration, dynamic, and
unpre-
dictability. The application of these three factors of ROD to
Nonaka’ s
four modes is discussed next.
Externalization Dynamism
The externalization mode must be dynamic and ongoing with
little
ability to forecast the longevity of any tacit-to-explicit
formulation.
In other words, tacit-to-explicit change may occur daily but may
only operate effectively for a shorter period due to additional
changes
brought on by technology dynamism. This means that members
in
a community must continually challenge themselves to revisit
pre-
vious tacit processes and acknowledge the need to reformulate
their
tacit systems. Thus, transformation from tacit knowledge to
explicit
knowledge can be a daily challenge for COP virtual
organizations.
173vIrtuAl te AMs And outsourCInG
Internalization Dynamism
Careful reflection on this process of internalizing explicit forms
must
be done. Given the differences in cultures and acceleration of
busi-
ness change, individualized learning creating new tacit abilities
may
not operate the same in different firm settings. It may be
necessary
to adopt multiple processes depending on the environment in
which
tacit operations are being performed. As stated, what might
work in
China may not work in Brazil, for example. Tacit behavior is
culture
oriented, so multiple and simultaneous versions must be
respected
and practiced. Further expansion of internalization is a virtual
team’ s
understanding of how such tacit behaviors change over time due
to
the acceleration of new business challenges.
Combination Dynamism
I believe the combination dynamism mode is the most important
com-
ponent of virtual team formation. Any combination or hybrid
model
requires a mature self— as specified in my maturity arcs
discussed in
Chapter 4. This means that individuals in virtual teams may
need to
be operating at a later stage of maturity to deal with the
complexities
of changing dispositions. Members of COPs must be observed,
and a
determination of readiness must be made for such new
structures to
develop in a virtual world. Thus, COP members need training;
the lack
of such training might explain why so many virtual teams have
had
disappointing results. Readiness for virtual team participation
depends
on a certain level of relativistic thinking. To be successful,
virtual team
members must be able to see themselves outside their own
world and
have the ability to understand the importance of what “ others”
need.
This position suggests that individuals need to be tested to the
extent
that they are ready for such challenges. Organizational learning
tech-
niques remain a valid method for developing workers who can
cope
with the dynamic changes that occur in virtual team
organizations.
Socialization Dynamism
Socialization challenges the virtual team members’ abilities to
understand the meaning of words and requires critical reflection
174 INFORMATION TECHNOLO GY
of its constituents. ROD requires that virtual teams be agile and,
especially, that they be responsive to the emotions of others in
the
community. This may require individuals to understand another
member’ s maturity. Thus, virtual team members need to be able
to understand why another member is behaving as he or she is
or
reacting in a dualistic manner. Assessment in a virtual
collabora-
tion becomes a necessity, especially given the unpredictability
of
technology-based projects.
In Table 5.1, I showed how tacit knowledge is mapped to ROD.
Table 7.3 further extends this mapping to include virtual teams.
The requirements support research findings that knowledge
man-
agement in a virtual context has significant factors that must be
addressed to improve its success. These factors include
management
commitment, resource availability, modification of work
practices,
marketing of the initiative, training, and facilitation of cultural
dif-
ferences (Peddibhotla & Subramani, 2008).
The following are some action steps that organizations need to
take
to address these factors:
1. The executive team needs to advocate the commitment and
support for virtual teams. The chief information officer (CIO)
and his or her counterparts need to provide teams with the
“ sponsorship” that the organization will need to endure set-
backs until the virtual organization becomes fully integrated
into the learning organization. This commitment can be
accomplished via multiple actions, including, but not limited
to, a kickoff meeting with staff, status reports to virtual teams
on successes and setbacks, e-mails and memos on new vir-
tual formations, and a general update on the effort, perhaps
on a quarterly basis. This approach allows the organization to
understand the evolution of the effort and know that virtual
teams are an important direction for the firm.
2. There should be training and practice sessions with
collocated
groups that allow teams to voice their concerns and receive
direction on how best to proceed. Practice sessions should
focus on team member responsibilities and advocating their
ownership of responsibility. These sessions should cover les-
sons learned from actual experiences, so that groups can learn
175vIrtuAl te AMs And outsourCInG
Ta
bl
e
7.
3
T
ac
it
Kn
ow
le
dg
e
an
d
Vi
rt
ua
l T
ea
m
s
TA
CI
T
KN
OW
LE
DG
E
ST
RA
TE
GI
C
IN
TE
GR
AT
IO
N
ST
RA
TE
GI
C
IN
TE
GR
AT
IO
N
VI
RT
UA
L
CU
LT
UR
AL
A
SS
IM
IL
AT
IO
N
CU
LT
UR
AL
A
SS
IM
IL
AT
IO
N
VI
RT
UA
L
Cu
ltu
ra
l a
nd
s
oc
ia
l
hi
st
or
y
Ho
w
th
e
IT
d
ep
ar
tm
en
t a
nd
o
th
er
de
pa
rt
m
en
ts
tr
an
sl
at
e
em
er
gi
ng
te
ch
no
lo
gi
es
in
to
th
ei
r e
xi
st
in
g
pr
oc
es
se
s
an
d
or
ga
ni
za
tio
n.
Ho
w
c
an
v
irt
ua
l a
nd
n
on
vi
rt
ua
l
de
pa
rt
m
en
ts
tr
an
sl
at
e
em
er
gi
ng
te
ch
no
lo
gi
es
in
to
th
ei
r p
ro
je
ct
s
ac
ro
ss
m
ul
tip
le
lo
ca
tio
ns
a
nd
cu
ltu
re
s?
Pr
ob
le
m
-s
ol
vi
ng
m
od
es
In
di
vi
du
al
re
fle
ct
iv
e
pr
ac
tic
es
th
at
a
ss
is
t i
n
de
te
rm
in
in
g
ho
w
sp
ec
ifi
c
te
ch
no
lo
gi
es
c
an
b
e
us
ef
ul
a
nd
h
ow
th
ey
c
an
b
e
ap
pl
ie
d;
u
til
iz
at
io
n
of
ta
ci
t
kn
ow
le
dg
e
to
e
va
lu
at
e
pr
ob
ab
ili
tie
s
fo
r s
uc
ce
ss
.
In
di
vi
du
al
re
fle
ct
iv
e
pr
ac
tic
es
an
d
in
te
rc
ul
tu
ra
l
co
m
m
un
ic
at
io
ns
n
ee
de
d
to
de
te
rm
in
e
ho
w
ta
ci
t k
no
w
le
dg
e
sh
ou
ld
b
e
ap
pl
ie
d
to
s
pe
ci
fic
gr
ou
p
an
d
pr
oj
ec
t n
ee
ds
.
Te
ch
no
lo
gy
o
pp
or
tu
ni
tie
s
m
ay
re
qu
ire
o
rg
an
iz
at
io
na
l a
nd
st
ru
ct
ur
al
c
ha
ng
es
to
tr
an
sf
er
ta
ci
t k
no
w
le
dg
e
to
e
xp
lic
it
kn
ow
le
dg
e.
Te
ch
no
lo
gi
ca
l o
pp
or
tu
ni
tie
s
m
ay
re
qu
ire
c
on
fig
ur
at
io
n
of
v
irt
ua
l
co
m
m
un
iti
es
o
f p
ra
ct
ic
e
an
d
ex
pl
ic
it
kn
ow
le
dg
e.
Or
ie
nt
at
io
n
to
ri
sk
s
an
d
un
ce
rt
ai
nt
ie
s
Te
ch
no
lo
gy
o
ff
er
s
m
an
y
ris
ks
a
nd
un
ce
rt
ai
nt
ie
s.
A
ll
ne
w
te
ch
no
lo
gi
es
m
ay
n
ot
b
e
va
lid
fo
r t
he
o
rg
an
iz
at
io
n.
T
ac
it
kn
ow
le
dg
e
is
a
v
al
ua
bl
e
co
m
po
ne
nt
to
fu
lly
u
nd
er
st
an
d
re
al
iti
es
, r
is
ks
, a
nd
un
ce
rt
ai
nt
ie
s.
Te
ch
no
lo
gy
ri
sk
s
an
d
un
ce
rt
ai
nt
ie
s
ne
ed
to
b
e
as
se
ss
ed
b
y
m
ul
tip
le
v
irt
ua
l
an
d
ph
ys
ic
al
te
am
s
to
de
te
rm
in
e
ho
w
te
ch
no
lo
gi
es
w
ill
o
pe
ra
te
a
cr
os
s
m
ul
tip
le
lo
ca
tio
ns
a
nd
c
ul
tu
re
s.
(C
on
tin
ue
d)
176 INFORMATION TECHNOLO GY
Ta
bl
e
7.
3
(
C
on
ti
nu
ed
)
T
ac
it
Kn
ow
le
dg
e
an
d
Vi
rt
ua
l T
ea
m
s
TA
CI
T
KN
OW
LE
DG
E
ST
RA
TE
GI
C
IN
TE
GR
AT
IO
N
ST
RA
TE
GI
C
IN
TE
GR
AT
IO
N
VI
RT
UA
L
CU
LT
UR
AL
A
SS
IM
IL
AT
IO
N
CU
LT
UR
AL
A
SS
IM
IL
AT
IO
N …
Assignment 1
(Top priority & High-Quality work required)
Please choose 1 of the 2 topics listed below list and create a
one-page essay to fully answer the question.
Topic 1: Define the IT organizational structure and how the IT
organizational structure impacts culture and change
management practices. Additionally, how does the
organizational structure impact competitive advantage?
Topic 2: How do you define operational excellence? What
factors are involved in achieving operational excellence? Who
(within an organization) is responsible for operational
excellence and why is this important?
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: One full page (Less than a page or more than a page
will be not accepted)
References: At-least 3 references
Do NOT use direct quotes, rather rephrase the work and utilize
in-text citations.
Assignment 2
Textbook: Information Systems for Business and Beyond
Please answer the following
From Chapter 9 – study questions 1-10 and Exercise 3
From Chapter 10 – study questions 1-10 and Exercise 1
All the above questions should be submitted in one Word
document
Please understand that Plagiarism will not be tolerated
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: At-least 5 pages, make sure not to limit your work to 5
pages, but answer all the questions.
References: Please use citations and references where
appropriate
No Plagiarism
Assignment 3
Textbook: Information Technology and Organizational Learning
Please answer the Following
From Chapter 7 – Review the section on dealing with multiple
locations and outsourcing. Review figure 7.2 and note how
virtual team communications further reiterates the importance
of this model.
From Chapter 8 - Review the Siemens AG case study. Note the
importance of understanding the interrelationships amongst all
the senior leaders at every location. Pay special attention to
Figure 8.1 and Figure 8.2. Note how the corporate CIO should
engage with each of the regional leaders. Why is this
important?
Submission Requirements
Font: Times New Roman, size 12, double-space
Length: At least two pages
Citation Style: APA
References: Please use citations and references where
appropriate
No Plagiarism
Assignment 4
Please answer the following
Discuss the differences between software development and
methods.
Please understand that Plagiarism will not be tolerated
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: At-least 500 words
References: Please use citations and references where
appropriate
No Plagiarism
Chapter 9 The People in Information Systems Learning Ob.docx

More Related Content

Similar to Chapter 9 The People in Information Systems Learning Ob.docx

lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology RaviKalola786
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture Hamzazafeer
 
Management Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxManagement Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxcroysierkathey
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Dhairya Joshi
 
College management
College managementCollege management
College managementanandhan30
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineeringTechglyphs
 
It proffesionals
It proffesionalsIt proffesionals
It proffesionalsahsan riaz
 
Software Process and Requirement
Software Process and RequirementSoftware Process and Requirement
Software Process and Requirementcricket2ime
 
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docx
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docxCHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docx
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docxchristinemaritza
 
Information systems, course project
Information systems, course projectInformation systems, course project
Information systems, course projectJoseph Attakorah
 
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusSoftware engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusNagaraj Hiremath
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentationanuj_rakheja
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringDesign Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringMeghaj Mallick
 
Shnab asgn
Shnab asgnShnab asgn
Shnab asgnANSYMOL
 

Similar to Chapter 9 The People in Information Systems Learning Ob.docx (20)

lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
 
Management Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docxManagement Information Systems – Week 7 Lecture 2Developme.docx
Management Information Systems – Week 7 Lecture 2Developme.docx
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7
 
College management
College managementCollege management
College management
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
 
Ems
EmsEms
Ems
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
It proffesionals
It proffesionalsIt proffesionals
It proffesionals
 
Software Process and Requirement
Software Process and RequirementSoftware Process and Requirement
Software Process and Requirement
 
computer Unit 1
computer Unit 1computer Unit 1
computer Unit 1
 
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docx
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docxCHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docx
CHAPTER 8 User InterfaceDesignChapter 8 is the first of thre.docx
 
Information systems, course project
Information systems, course projectInformation systems, course project
Information systems, course project
 
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusSoftware engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentation
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringDesign Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software Engineering
 
Shnab asgn
Shnab asgnShnab asgn
Shnab asgn
 

More from spoonerneddy

Choose a National Transportation Safety Board (NTSB) report of a w.docx
Choose a National Transportation Safety Board (NTSB) report of a w.docxChoose a National Transportation Safety Board (NTSB) report of a w.docx
Choose a National Transportation Safety Board (NTSB) report of a w.docxspoonerneddy
 
Choose a global health issue. For this assignment, you will introduc.docx
Choose a global health issue. For this assignment, you will introduc.docxChoose a global health issue. For this assignment, you will introduc.docx
Choose a global health issue. For this assignment, you will introduc.docxspoonerneddy
 
Choose a geographic community of interest (Hyde park, Illinois) and .docx
Choose a geographic community of interest (Hyde park, Illinois) and .docxChoose a geographic community of interest (Hyde park, Illinois) and .docx
Choose a geographic community of interest (Hyde park, Illinois) and .docxspoonerneddy
 
Choose a disease condition of the gastrointestinal tract, describe.docx
Choose a disease condition of the gastrointestinal tract, describe.docxChoose a disease condition of the gastrointestinal tract, describe.docx
Choose a disease condition of the gastrointestinal tract, describe.docxspoonerneddy
 
Choose a few health issues in your community that can be used to pla.docx
Choose a few health issues in your community that can be used to pla.docxChoose a few health issues in your community that can be used to pla.docx
Choose a few health issues in your community that can be used to pla.docxspoonerneddy
 
Choose a current member of Congress and research their background. P.docx
Choose a current member of Congress and research their background. P.docxChoose a current member of Congress and research their background. P.docx
Choose a current member of Congress and research their background. P.docxspoonerneddy
 
Choose a couple of ways how your life would be different without the.docx
Choose a couple of ways how your life would be different without the.docxChoose a couple of ways how your life would be different without the.docx
Choose a couple of ways how your life would be different without the.docxspoonerneddy
 
Choose a countrydifferent fromyournative country,and.docx
Choose a countrydifferent fromyournative country,and.docxChoose a countrydifferent fromyournative country,and.docx
Choose a countrydifferent fromyournative country,and.docxspoonerneddy
 
Choose 5 questions and answer them with my materials onlyD.docx
Choose 5 questions and answer them with my materials onlyD.docxChoose 5 questions and answer them with my materials onlyD.docx
Choose 5 questions and answer them with my materials onlyD.docxspoonerneddy
 
Choose a communication situation you recently experienced at you.docx
Choose a communication situation you recently experienced at you.docxChoose a communication situation you recently experienced at you.docx
Choose a communication situation you recently experienced at you.docxspoonerneddy
 
Choose 5 interconnected leadership task (listed below). Tell why eac.docx
Choose 5 interconnected leadership task (listed below). Tell why eac.docxChoose 5 interconnected leadership task (listed below). Tell why eac.docx
Choose 5 interconnected leadership task (listed below). Tell why eac.docxspoonerneddy
 
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docx
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docxChoose 5 out of the first 10 questions, 5 pages essay1. Where do.docx
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docxspoonerneddy
 
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docx
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docxChoose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docx
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docxspoonerneddy
 
Choose 1 topic to write an essay. Dont restate all the time. Write .docx
Choose 1 topic to write an essay. Dont restate all the time. Write .docxChoose 1 topic to write an essay. Dont restate all the time. Write .docx
Choose 1 topic to write an essay. Dont restate all the time. Write .docxspoonerneddy
 
Choose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, educatio.docxChoose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, educatio.docxspoonerneddy
 
Choose 1 focal point from each subcategory of practice, education, r.docx
Choose 1 focal point from each subcategory of practice, education, r.docxChoose 1 focal point from each subcategory of practice, education, r.docx
Choose 1 focal point from each subcategory of practice, education, r.docxspoonerneddy
 
Chinese HistoryBased on the lecture on Chinese History and Marxi.docx
Chinese HistoryBased on the lecture on Chinese History and Marxi.docxChinese HistoryBased on the lecture on Chinese History and Marxi.docx
Chinese HistoryBased on the lecture on Chinese History and Marxi.docxspoonerneddy
 
Children need an Aesthetics Experience from the teacher and in the c.docx
Children need an Aesthetics Experience from the teacher and in the c.docxChildren need an Aesthetics Experience from the teacher and in the c.docx
Children need an Aesthetics Experience from the teacher and in the c.docxspoonerneddy
 
China’s economy中国经济httpworldmap.harvard.educhinamap.docx
China’s economy中国经济httpworldmap.harvard.educhinamap.docxChina’s economy中国经济httpworldmap.harvard.educhinamap.docx
China’s economy中国经济httpworldmap.harvard.educhinamap.docxspoonerneddy
 
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docx
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docxChildrens Health Insurance Program CHIP. Respond to the 5 questions.docx
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docxspoonerneddy
 

More from spoonerneddy (20)

Choose a National Transportation Safety Board (NTSB) report of a w.docx
Choose a National Transportation Safety Board (NTSB) report of a w.docxChoose a National Transportation Safety Board (NTSB) report of a w.docx
Choose a National Transportation Safety Board (NTSB) report of a w.docx
 
Choose a global health issue. For this assignment, you will introduc.docx
Choose a global health issue. For this assignment, you will introduc.docxChoose a global health issue. For this assignment, you will introduc.docx
Choose a global health issue. For this assignment, you will introduc.docx
 
Choose a geographic community of interest (Hyde park, Illinois) and .docx
Choose a geographic community of interest (Hyde park, Illinois) and .docxChoose a geographic community of interest (Hyde park, Illinois) and .docx
Choose a geographic community of interest (Hyde park, Illinois) and .docx
 
Choose a disease condition of the gastrointestinal tract, describe.docx
Choose a disease condition of the gastrointestinal tract, describe.docxChoose a disease condition of the gastrointestinal tract, describe.docx
Choose a disease condition of the gastrointestinal tract, describe.docx
 
Choose a few health issues in your community that can be used to pla.docx
Choose a few health issues in your community that can be used to pla.docxChoose a few health issues in your community that can be used to pla.docx
Choose a few health issues in your community that can be used to pla.docx
 
Choose a current member of Congress and research their background. P.docx
Choose a current member of Congress and research their background. P.docxChoose a current member of Congress and research their background. P.docx
Choose a current member of Congress and research their background. P.docx
 
Choose a couple of ways how your life would be different without the.docx
Choose a couple of ways how your life would be different without the.docxChoose a couple of ways how your life would be different without the.docx
Choose a couple of ways how your life would be different without the.docx
 
Choose a countrydifferent fromyournative country,and.docx
Choose a countrydifferent fromyournative country,and.docxChoose a countrydifferent fromyournative country,and.docx
Choose a countrydifferent fromyournative country,and.docx
 
Choose 5 questions and answer them with my materials onlyD.docx
Choose 5 questions and answer them with my materials onlyD.docxChoose 5 questions and answer them with my materials onlyD.docx
Choose 5 questions and answer them with my materials onlyD.docx
 
Choose a communication situation you recently experienced at you.docx
Choose a communication situation you recently experienced at you.docxChoose a communication situation you recently experienced at you.docx
Choose a communication situation you recently experienced at you.docx
 
Choose 5 interconnected leadership task (listed below). Tell why eac.docx
Choose 5 interconnected leadership task (listed below). Tell why eac.docxChoose 5 interconnected leadership task (listed below). Tell why eac.docx
Choose 5 interconnected leadership task (listed below). Tell why eac.docx
 
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docx
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docxChoose 5 out of the first 10 questions, 5 pages essay1. Where do.docx
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docx
 
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docx
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docxChoose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docx
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docx
 
Choose 1 topic to write an essay. Dont restate all the time. Write .docx
Choose 1 topic to write an essay. Dont restate all the time. Write .docxChoose 1 topic to write an essay. Dont restate all the time. Write .docx
Choose 1 topic to write an essay. Dont restate all the time. Write .docx
 
Choose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, educatio.docxChoose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, educatio.docx
 
Choose 1 focal point from each subcategory of practice, education, r.docx
Choose 1 focal point from each subcategory of practice, education, r.docxChoose 1 focal point from each subcategory of practice, education, r.docx
Choose 1 focal point from each subcategory of practice, education, r.docx
 
Chinese HistoryBased on the lecture on Chinese History and Marxi.docx
Chinese HistoryBased on the lecture on Chinese History and Marxi.docxChinese HistoryBased on the lecture on Chinese History and Marxi.docx
Chinese HistoryBased on the lecture on Chinese History and Marxi.docx
 
Children need an Aesthetics Experience from the teacher and in the c.docx
Children need an Aesthetics Experience from the teacher and in the c.docxChildren need an Aesthetics Experience from the teacher and in the c.docx
Children need an Aesthetics Experience from the teacher and in the c.docx
 
China’s economy中国经济httpworldmap.harvard.educhinamap.docx
China’s economy中国经济httpworldmap.harvard.educhinamap.docxChina’s economy中国经济httpworldmap.harvard.educhinamap.docx
China’s economy中国经济httpworldmap.harvard.educhinamap.docx
 
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docx
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docxChildrens Health Insurance Program CHIP. Respond to the 5 questions.docx
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docx
 

Recently uploaded

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Chapter 9 The People in Information Systems Learning Ob.docx

  • 1. Chapter 9: The People in Information Systems Learning Objectives Upon successful completion of this chapter, you will be able to: • describe each of the different roles that people play in the design, development, and use of information systems; • understand the different career paths available to those who work with information systems; • explain the importance of where the information- systems function is placed in an organization; and • describe the different types of users of information systems. Introduction The opening chapters of this text focused on the technology behind
  • 2. information systems, namely hardware, software, data, and networking. The last chapter covered business processes and the Chapter 9: The People in Information Systems | 189 U. S. Bureau of Labor Statistics – 2020 Projections key role they can play in the success of a business. This chapter discusses people, the last component of an information system. People are involved in information systems in just about every way. People imagine information systems, people develop information systems, people support information systems, and, perhaps most importantly, people use information systems. The Creators of Information Systems The first group of people to be considered play a role in designing, developing, and building information systems. These people are generally technical and have a background in programming,
  • 3. analysis, information security, or database design. Just about everyone who works in the creation of information systems has a minimum of a bachelor’s degree in computer science or information systems, though that is not necessarily a requirement. The process of creating information systems will be covered in more detail in Chapter 10. The following chart shows the U. S. Bureau of Labor Statistics projections for computing career employment in 2020. 190 | Information Systems for Business and Beyond (2019) Systems Analyst The systems analyst straddles the divide between identifying business needs and imagining a new or redesigned system to fulfill those needs. This individual works with a team or department seeking to identify business requirements and analyze the specific
  • 4. details of an existing system or a system that needs to be built. Generally, the analyst is required to have a good understanding of the business itself, the purpose of the business, the business processes involved, and the ability to document them well. The analyst identifies the different stakeholders in the system and works to involve the appropriate individuals in the analysis process. Prior to analyzing the problem or the system of concern, the analyst needs to a) clearly identify the problem, b) gain approval for the project, c) identify the stakeholders, and d) develop a plan to monitor the project. The analysis phase of the project can be broken down into five steps. 1. Seek out and identify the details 2. Specify requirements 3. Decide which requirements are most important 4. Create a dialog showing how the user interacts with the existing system
  • 5. 5. Ask users to critique the list of requirements that have been developed The analysis phase involves both the systems analyst and the users. It is important to realize the role the users take in the analysis of the system. Users can have significant insights into how well the current system functions as well as suggest improvements. Once the requirements are determined, the analyst begins the process of translating these requirements into an information systems design. It is important to understand which different technological solutions will work and provide several alternatives to the client, based on the company’s budgetary constraints, Chapter 9: The People in Information Systems | 191 technology constraints, and culture. Once the solution is selected, the analyst will create a detailed document describing the new system. This new document will require that the analyst
  • 6. understand how to speak in the technical language of systems developers. The design phase results in the components of the new system being identified, including how they relate to one another. The designer needs to communicate clearly with software developers as well database administrators by using terminology that is consistent with both of these specialties. The design phase of the project can be broken down into six steps. 1. Design the hardware environment 2. Design the software 3. Design how the new system will interface with the users 4. Design hardware interfaces 5. Design database tables 6. Design system security A systems analyst generally is not the one who does the actual development of the information system. The design document created by the systems analyst provides the detail needed to
  • 7. create the system and is handed off to a developer to actually write the software and to the database administrator to build the database and tables that will be in the database. Sometimes the system may be assembled from off-the-shelf components by a person called a systems integrator. This is a specific type of systems analyst that understands how to get different software packages to work with each other. To become a systems analyst, you should have a background both in the business analysis and in systems design. Many analysts first work as developers and have business experience before becoming system analysts. It is vital for analysts to clearly understand the purpose of the business of interest, realizing that all businesses are unique. 192 | Information Systems for Business and Beyond (2019)
  • 8. Programmer/Developer Programmers spend their time writing computer code in a programming language. In the case of systems development, programmers generally attempt to fulfill the design specifications given to them by a systems analyst/designer. Many different styles of software development exist A programmer may work alone for long stretches of time or work as part of a team with other developers. A programmer needs to be able to understand complex processes and also the intricacies of one or more programming languages. Computer Engineer Computer engineers design the computing devices that are used every day. There are many types of computer engineers who work on a variety of different types of devices and systems. Some of the more prominent computer engineering jobs are as follows:
  • 9. • Hardware engineer. A hardware engineer designs hardware and test components such as microprocessors, memory devices, routers, and networks. Many times, a hardware engineer is at the cutting edge of computing technology, creating something brand new. Other times, the hardware engineer’s job is to re-engineer an existing component to work faster or use less power. Many times a hardware engineer’s job is to write code to create a program that will be implemented directly on a computer chip. • Software engineer. Software engineers tend to focus on a specific area of software such as operating systems, networks, applications, or databases. Software engineers use three primary skill areas: computer science, engineering, and mathematics. Chapter 9: The People in Information Systems | 193 • Systems engineer. A systems engineer takes the components designed by other engineers and makes them all work together, focusing on the integration of hardware and software. For example, to build a computer the mother board,
  • 10. processor, memory, and hard disk all have to work together. A systems engineer has experience with many different types of hardware and software and knows how to integrate them to create new functionality. • Network engineer. A network engineer understands the networking requirements of an organization and then designs a communications system to meet those needs, using the networking hardware and software, sometimes referred to as a network operating system. Network engineers design both local area networks as well as wide area networks. There are many different types of computer engineers, and often the job descriptions overlap. While many may call themselves engineers based on a company job title, there is also a professional designation of “professional engineer” which has specific requirements. In the United States each state has its own set of requirements for the use of this title, as do different countries around the world. Most often, it involves a professional licensing
  • 11. exam. Information Systems Operations and Administration Another group of information systems professionals are involved in the day-to-day operations and administration of IT. These people must keep the systems running and up-to-date so that the rest of the organization can make the most effective use of these resources. 194 | Information Systems for Business and Beyond (2019) Computer Operator A computer operator is the person who oversees the mainframe computers and data centers in organizations. Some of their duties include keeping the operating systems up to date, ensuring available memory and disk storage, providing for redundancy (think electricity, connectivity to the Internet, and database backups), and
  • 12. overseeing the physical environment of the computer. Since mainframe computers increasingly have been replaced with servers, storage management systems, and other platforms, computer operators’ jobs have grown broader and include working with these specialized systems. Database Administrator A Database Administrator (DBA) is the person who designs and manages the databases for an organization. This person creates and maintains databases that are used as part of applications or the data warehouse. The DBA also consults with systems analysts and programmers on projects that require access to or the creation of databases. Help Desk/Support Analyst Most mid-size to large organizations have their own information technology help desk. The help desk is the first line of support for
  • 13. computer users in the company. Computer users who are having problems or need information can contact the help desk for assistance. Many times a help desk worker is a junior level employee who is able to answer basic issues that users need assistance with. Help desk analysts work with senior level support analysts or have a Chapter 9: The People in Information Systems | 195 computer knowledgebase at their disposal to help them investigate the problem at hand. The help desk is a great place to break into working in IT because it exposes you to all of the different technologies within the company. A successful help desk analyst should have good communications skills and a sincere interest in helping users. Trainer A computer trainer conducts classes to teach people specific
  • 14. computer skills. For example, if a new ERP system is being installed in an organization, one part of the implementation process is to teach all of the users how to use the new system. A trainer may work for a software company and be contracted to come in to conduct classes when needed; a trainer may work for a company that offers regular training sessions. Or a trainer may be employed full time for an organization to handle all of their computer instruction needs. To be successful as a trainer you need to be able to communicate technical concepts clearly and demonstrate patience with learners. Managing Information Systems The management of information-systems functions is critical to the success of information systems within the organization. Here are some of the jobs associated with the management of information systems.
  • 15. 196 | Information Systems for Business and Beyond (2019) CIO The Chief Information Officer (CIO) is the head of the information- systems function. This person aligns the plans and operations of the information systems with the strategic goals of the organization. Tasks include budgeting, strategic planning, and personnel decisions for the information systems function. The CIO must also be the face of the IT department within the organization. This involves working with senior leaders in all parts of the organization to ensure good communication, planning, and budgeting. Interestingly, the CIO position does not necessarily require a lot of technical expertise. While helpful, it is more important for this person to have good management skills and understand the business. Many organizations do not have someone with the title
  • 16. of CIO. Instead, the head of the information systems function is called the Vice President of Information Systems or Director of Information Systems. Functional Manager As an information systems organization becomes larger, many of the different functions are grouped together and led by a manager. These functional managers report to the CIO and manage the employees specific to their function. For example, in a large organization there are a group of systems analysts who report to a manager of the systems analysis function. For more insight into how this might look, see the discussion later in the chapter of how information systems are organized. Chapter 9: The People in Information Systems | 197 Gantt Chart for managing projects
  • 17. ERP Management Organizations using an ERP require one or more individuals to manage these systems. EPR managers make sure that the ERP system is completely up to date, work to implement any changes to the ERP that are needed, and consult with various user departments on needed reports or data extracts. Project Managers Information systems projects are notorious for going over budget and being delivered late. In many cases a failed IT project can spell doom for a company. A project manager is responsible for keeping projects on time and on budget. This person works with the stakeholders of the project to keep the team organized and communicates the status of the project to management. Gantt charts, shown above, are used to graphically illustrate a project’s schedule, tasks, and resources.
  • 18. A project manager does not have authority over the project team. 198 | Information Systems for Business and Beyond (2019) Instead, the project manager coordinates schedules and resources in order to maximize the project outcomes. This leader must be a good communicator and an extremely organized person. A project manager should also have good people skills. Many organizations require each of their project managers to become certified as a Project Management Professional (PMP). Information Security Officer An information security officer is in charge of setting information security policies for an organization and then overseeing the implementation of those policies. This person may have one or more people reporting to them as part of the information security team.
  • 19. As information has become a critical asset, this position has become highly valued. The information security officer must ensure that the organization’s information remains secure from both internal and external threats. Emerging Roles As technology evolves many new roles are becoming more common as other roles diminish. For example, as we enter the age of “big data,” we are seeing the need for more data analysts and business intelligence specialists. Many companies are now hiring social media experts and mobile technology specialists. The increased use of cloud computing and Virtual Machine (VM) technologies also is increasing demand for expertise in those areas. Chapter 9: The People in Information Systems | 199 http://www.pmi.org/Certification/Project-Management-
  • 20. Professional-PMP.aspx Career Paths in Information Systems (click to enlarge) Career Paths in Information Systems These job descriptions do not represent all possible jobs within an information systems organization. Larger organizations will have more specialized roles, while smaller organizations may combine some of these roles. Many of these roles may exist outside of a traditional information- systems organization, as we will discuss below. Working with information systems can be a rewarding
  • 21. career choice. Whether you want to be involved in very technical jobs (programmer, database administrator), or you want to be involved in working with people (systems analyst, trainer, project manager), there are many different career paths available. Many times those in technical jobs who want career advancement find themselves in a dilemma. A person can continue doing technical work, where sometimes their advancement options are limited, or become a manager of other employees and put themselves on a management career track. In many cases those proficient in technical skills are not gifted with managerial skills. Some organizations, especially those that highly value their technically skilled employees, create a technical track that exists in parallel to the management track so that they can retain
  • 22. employees who are contributing to the organization with their technical skills. 200 | Information Systems for Business and Beyond (2019) https://opentextbook.site/informationsystems2019/wp- content/uploads/sites/3/2018/07/Career-Paths.png https://opentextbook.site/informationsystems2019/wp- content/uploads/sites/3/2018/07/Career-Paths.png CISCO certification badge Sidebar: Are Certifications Worth Pursuing? As technology becomes more important to businesses, hiring employees with technical skills is becoming critical. But how can an organization ensure that the person they are hiring has the necessary skills? Many organizations are including technical certifications as a prerequisite for getting hired. Cisco Certified Internetwork Expert. Certifications are designations given by a certifying body that someone
  • 23. has a specific level of knowledge in a specific technology. This certifying body is often the vendor of the product itself, though independent certifying organizations, such as CompTIA, also exist. Many of these organizations offer certification tracks, allowing a beginning certificate as a prerequisite to getting more advanced certificates. To get a certificate, you generally attend one or more training classes and then take one or more certification exams. Passing the exams with a certain score will qualify you for a certificate. In most cases, these classes and certificates are not free. In fact a highly technical certification can cost thousands dollars. Some examples of the certifications in highest demand include Microsoft (software certifications), Cisco
  • 24. (networking), and SANS (security). For many working in IT, determining whether to pursue one or more of these certifications is an important question. For many jobs, Chapter 9: The People in Information Systems | 201 http://certification.comptia.org/home.aspx http://www.microsoft.com/learning/en/us/certification- overview.aspx http://www.cisco.com/web/learning/certifications/index.html http://www.sans.org/ such as those involving networking or security, a certificate will be required by the employer as a way to determine which potential employees have a basic level of skill. For those who are already in an IT career, a more advanced certificate may lead to a promotion. For those wondering about the importance of certification, the best solution is to talk to potential employers and those already working in the field to determine the best choice.
  • 25. Organizing the Information Systems Function In the early years of computing, the information-systems function (generally called “data processing”) was placed in the finance or accounting department of the organization. As computing became more important, a separate information-systems function was formed, but it still was generally placed under the Chief Financial Officer and considered to be an administrative function of the company. By the 1980s and 1990s, when companies began networking internally and then connecting to the Internet, the information systems function was combined with the telecommunications functions and designated as the Information Technology (IT) department. As the role of information technology continued to increase, its place in the organization became more important. In many organizations today, the head of IT (the CIO) reports directly to the CEO.
  • 26. Where in the Organization Should IS Be? Before the advent of the personal computer, the information 202 | Information Systems for Business and Beyond (2019) systems function was centralized within organizations in order to maximize control over computing resources. When the PC began proliferating, many departments within organizations saw it as a chance to gain some computing resources for themselves. Some departments created an internal information systems group, complete with systems analysts, programmers, and even database administrators. These departmental IS groups were dedicated to the information needs of their own departments, providing quicker turnaround and higher levels of service than a centralized IT department. However, having several IS groups within an organization led to a lot of inefficiencies. There were now several people performing the same jobs in different departments. This
  • 27. decentralization also led to company data being stored in several places all over the company. In some organizations a matrix reporting structure developed in which IT personnel were placed within a department and reported to both the department management and the functional management within IS. The advantages of dedicated IS personnel for each department must be weighed against the need for more control over the strategic information resources of the company. For many companies, these questions are resolved by the implementation of the ERP system (see discussion of ERP in Chapter 8). Because an ERP system consolidates most corporate data back into a single database, the implementation of an ERP system requires organizations to find “silos” of data so that they can integrate them back into the corporate system. The ERP allows organizations to regain control of their information and influences
  • 28. organizational decisions throughout the company. Outsourcing Frequently an organization needs a specific skill for a limited period of time. Instead of training existing employees or hiring new staff, Chapter 9: The People in Information Systems | 203 it may make more sense to outsource the job. Outsourcing can be used in many different situations within the information systems function, such as the design and creation of a new website or the upgrade of an ERP system. Some organizations see outsourcing as a cost-cutting move, contracting out a whole group or department. New Models of Organizations The integration of information technology has influenced the structure of organizations. The increased ability to communicate and share information has led to a “flattening” of the organizational
  • 29. structure due to the removal of one or more layers of management. The network-based organizational structure is another changed enabled by information systems. In a network-based organizational structure, groups of employees can work somewhat independently to accomplish a project. People with the right skills are brought together for a project and then released to work on other projects when that project is over. These groups are somewhat informal and allow for all members of the group to maximize their effectiveness. Information Systems Users – Types of Users Besides the people who work to create, administer, and manage information systems, there is one more extremely important group of people, namely, the users of information systems. This group represents a very large percentage of an organization’s employees. If the user is not able to successfully learn and use an
  • 30. information system, the system is doomed to failure. Technology adoption user types 204 | Information Systems for Business and Beyond (2019) Diffusion of Innovation (click to enlarge) One tool that can be used to understand how users will adopt a new technology comes from a 1962 study by Everett Rogers. In his book, Diffusion of Innovation,[1]Rogers studied how farmers adopted new technologies and noticed that the adoption rate started slowly and then dramatically increased once adoption hit a
  • 31. certain point. He identified five specific types of technology adopters: • Innovators. Innovators are the first individuals to adopt a new technology. Innovators are willing to take risks, are the youngest in age, have the highest social class, have great financial liquidity, are very social, and have the closest contact with scientific sources and interaction with other innovators. Risk tolerance is high so there is a willingness to adopt technologies thast may ultimately fail. Financial resources help absorb these failures (Rogers, 1962, p. 282). • Early adopters. The early adopters are those who adopt innovation soon after a technology has been introduced and proven. These individuals have the highest degree of opinion leadership among the other adopter categories, which means that these adopters can influence the opinions of the largest majority. Characteristics include being younger in age, having a higher social status, possessing more financial liquidity, having advanced education, and being more socially aware than later adopters. These adopters are more discrete in adoption
  • 32. choices than innovators, and realize judicious choice of adoption will help them maintain a central communication position (Rogers, 1962, p. 283). • Early majority. Individuals in this category adopt an innovation Chapter 9: The People in Information Systems | 205 https://opentextbook.site/informationsystems2019/wp- content/uploads/sites/3/2018/07/diffusion-of-innovation.png https://opentextbook.site/informationsystems2019/wp- content/uploads/sites/3/2018/07/diffusion-of-innovation.png after a varying degree of time. This time of adoption is significantly longer than the innovators and early adopters. This group tends to be slower in the adoption process, has above average social status, has contact with early adopters, and seldom holds positions of opinion leadership in a system (Rogers, 1962, p. 283). • Late majority. The late majority will adopt an innovation after the average member of the society. These individuals approach an innovation with a high degree of skepticism, have below average social status, very little financial liquidity, are in
  • 33. contact with others in the late majority and the early majority, and show very little opinion leadership. • Laggards. Individuals in this category are the last to adopt an innovation. Unlike those in the previous categories, individuals in this category show no opinion leadership. These individuals typically have an aversion to change agents and tend to be advanced in age. Laggards typically tend to be focused on “traditions,” are likely to have the lowest social status and the lowest financial liquidity, be oldest of all other adopters, and be in contact with only family and close friends.[2] These five types of users can be translated into information technology adopters as well, and provide additional insight into how to implement new information systems within the organization. For example, when rolling out a new system, IT may want to identify the innovators and early adopters within the organization and work with them first, then leverage their adoption to drive the rest of the
  • 34. implementation to the other users. Summary In this chapter we have reviewed the many different categories of individuals who make up the people component of information 206 | Information Systems for Business and Beyond (2019) systems. The world of information technology is changing so fast that new roles are being created all the time and roles that existed for decades are being phased out. This chapter this chapter should have given you a good idea and appreciation for the importance of the people component of information systems. Study Questions 1. Describe the role of a systems analyst. 2. What are some of the different roles for a computer engineer? 3. What are the duties of a computer operator? 4. What does the CIO do?
  • 35. 5. Describe the job of a project manager. 6. Explain the point of having two different career paths in information systems. 7. What are the advantages and disadvantages of centralizing the IT function? 8. What impact has information technology had on the way companies are organized? 9. What are the five types of information-systems users? 10. Why would an organization outsource? Exercises 1. Which IT job would you like to have? Do some original research and write a two-page paper describing the duties of the job you are interested in. 2. Spend a few minutes on Dice or Monster to find IT jobs in your area. What IT jobs are currently … 16 3
  • 36. 7 viRTual Te ams anD ouTsouRCing Introduction Much has been written and published about virtual teams. Most define virtual teams as those that are geographically dispersed, although others state that virtual teams are those that primarily inter- act electronically. Technology has been the main driver of the growth of virtual teams. In fact, technology organizations, due mostly to the advent of competitive outsourcing abroad, have pushed information technology (IT) teams to learn how to manage across geographical locations, in such countries as India, China, Brazil, Ireland, and many others. These countries are not only physically remote but also present barriers of culture and language. These barriers often impede commu- nications about project status, and affect the likelihood of delivering a project on time, and within forecasted budgets. Despite these major challenges, outsourcing remains attractive due to the associated cost savings and talent supply. These two advantages are closely associated. Consider the migration of IT talent that began
  • 37. with the growth of India in providing cheap and educated talent. The promise of cost savings caused many IT development departments to begin using more India-based firms. The ensuing decline in IT jobs in the United States resulted in fewer students entering IT curricu- lums at U.S. universities for fear that they would not be able to find work. Thus, began a cycle of lost jobs in the United States and further demand for talent abroad. Now, technology organizations are faced with the fact that they must learn to manage virtually because the tal- ent they need is far away. From an IT perspective, successful outsourcing depends on effec- tive use of virtual teams. However, the converse is not true; that is, virtual teams do not necessarily imply outsourcing. Virtual teams can 16 4 INFORMATION TECHNOLO GY be made up of workers anywhere, even those in the United States who are working from a distance rather than reporting to an office for work. A growing number of employees in the United States want more personal flexibility; in response, many companies are
  • 38. allow- ing employees to work from home more often— and have found the experience most productive. This type of virtual team management generally follows a hybrid model, with employees working at home most of the time but reporting to the office for critical meetings; an arrangement that dramatically helps with communication and allows management to have quality checkpoints. This chapter addresses virtual teams working both within the United States and on an outsource basis and provides readers with an understanding of when and how to consider outsource partners. Chapter topics include management considerations, dealing with multiple locations, contract administration, and in-house alternatives. Most important, this chapter examines organizational learning as a critical component of success in using virtual teams. Although the advent of virtual teams creates another level of complexity for design- ing and maintaining learning organizations, organizational learning approaches represent a formidable solution to the growing dilemma of how teams work, especially those that are 100% virtual. Most failures in virtual management are caused by poor communi- cation. From an organizational learning perspective, we would
  • 39. define this as differences in meaning making— stemming mostly from cul- tural differences in the meaning of words and differing behavioral norms. There is also no question that time zone differences play a role in certain malfunctions of teams, but the core issues remain commu- nication related. As stated, concerning the Ravell case study, cultural transformation is slow to occur and often happens in small intervals. In many virtual team settings, team members may never do more than communicate via e-mail. As an example, I had a client who was outsourcing produc- tion in China. One day, they received an e-mail stating, “ We cannot do business with you.” Of course, the management team was confused and worried, seeking to understand why the business arrangement was ending without any formal discussions of the problem. A trans- lator in China was hired to help clarify the dilemma. As it turned out, the statement was meant to suggest that the company needed 16 5vIrtuAl te AMs And outsourCInG
  • 40. to provide more business— more work, that is. The way the Chinese communicated that need was different from the Western interpre- tation. This is just a small example of what can happen without a well-thought-out organizational learning scheme. That is, individuals need to develop more reflective abilities to comprehend the meaning of words before they take action, especially in virtual environments across multiple cultures. The development of such abilities— the continual need for organizations to respond effectively to dynamic changes, brought about by technology, in this case, e-mail— is consis- tent with my theory of responsive organizational dynamism (ROD). The e-mail established a new dynamic of communication. Think how often specifications and product requirements are changing and need virtual teams to somehow come together and agree on how to get the work done— or think they agree. Prior research and case studies provide tools and procedures as ways to improve productivity and quality of virtual team operations. While such processes and methodologies are helpful, they will not necessar- ily ensure the successful outcomes that IT operations seek unless they
  • 41. also change. Specifically, new processes alone are not sufficient or a substitute for learning how to better communicate and make mean- ing in a virtual context. Individuals must learn how to develop new behaviors when working virtually. We must also remember that vir- tual team operations are not limited to IT staffs. Business users often need to be involved as they would in any project, particularly when users are needed to validate requirements and test the product. Status of Virtual Teams The consensus tells us that virtual teams render results. According to Bazarova and Walther (2009), “ Virtual groups whose members com- municate primarily or entirely via email, computer conferencing, chat, or voice— have become a common feature of twenty-first century organizations” (p. 252). Lipnack and Stamps (2000) state that virtual teams will become the accepted way to work and will likely reshape the work world. While this prediction seems accurate, there has also been evidence of negative attribution or judgment about problems that arise in virtual team performance. Thus, it is important to understand how virtual teams need to be managed and how realistic expectations
  • 42. 16 6 INFORMATION TECHNOLO GY of such teams might be formed. So, while organizations understand the need for virtual teams, they are not necessarily happy with proj- ect results. Most of the disappointment relates to a lack of individual development that helps change the mindset of how people need to communicate, coupled with updated processes. Management Considerations Attribution theory “ describes how people typically generate explana- tions for outcomes and actions— their own and others” (Bazarova & Walther, 2009, p. 153). This theory explains certain behavior patterns that have manifested during dysfunctional problems occurring in man- aging virtual teams. Virtual teams are especially vulnerable to such problems because their limited interactions can lead to members not having accurate information about one another. Members of virtual teams can easily develop perceptions of each other’ s motives that are inaccurate or distorted by differing cultural norms. Research also shows us that virtual team members typically attribute failure to the
  • 43. external factors and successes to internal factors. Problems are blamed on the virtual or outside members for not being available or accountable to the physical community. The successes then tend to reinforce that virtual teams are problematic because of their very nature. This then estab- lishes the dilemma of the use of virtual teams and organizations— its use will continue to increase and dominate workplace structures and yet will present challenges to organizations that do not want to change. The lack of support to change will be substantiated during failures in expected outcomes. Some of the failures, however, can and should be attributable to distance. As Olson and Olson (2000) state: “ Distance will persist as an important element of human experience” (p. 172). So, despite the advent of technology, it is important not to ignore the social needs that teams need to have to be effective. Dealing with Multiple Locations Perhaps the greatest difficulty in implementing virtual teams is the reality that they span multiple locations. More often, these locations can be in different time zones and within multiple cultures. To prop- erly understand the complexity of interactions, it makes sense to
  • 44. revisit 16 7vIrtuAl te AMs And outsourCInG the organizational learning tools discussed in prior chapters. Perhaps another way of viewing virtual teams and their effects on organiza- tion learning is to perceive it as another dimension— a dimension that is similar to multiple layers in a spreadsheet. This notion means that virtual teams do not upset the prior relations between technology as a variable from a two-dimensional perspective, rather in the depth of how it affects this relationship in a third dimension. Figure 7.1 reflects how this dimension should be perceived. In other words, the study of virtual teams should be viewed as a subset of the study of organizations. When we talk about work- place activities, we need to address issues at the component level. In this example, the components are the physical organization and the Technology as an independent variable Creates
  • 45. Virtual organizational dynamism dimension Physical organizational dynamism dimension Virtual acceleration dimension Strategic integration Cultural assimilation Total organizational dynamism Acceleration of events that require different infrastructures and organizational processes Virtual cultural assimilation dimension Virtual strategic integration dimension Figure 7.1 The three-dimensional ROD.
  • 46. 16 8 INFORMATION TECHNOLO GY virtual organization. The two together make up the superset or the entire organization. To be fruitful, any discussion of virtual organiza- tions must be grounded in the context of the entire organization and address the complete topic of workplace learning and transformation. In Chapter 4, I discussed organizational learning in communities of practice (COP). In this section, I expand that discussion to include virtual organizational structures. The growing use of virtual teams may facilitate the complete inte- gration of IT and non-IT workers. The ability to connect from various locations using technology itself has the potential to expand COP. But, as discussed in Chapter 4, it also presents new challenges, most of which relate to the transient nature of members, who tend to par- ticipate on more of a subject or transactional basis, rather than being permanent members of a group. Table 7.1 reflects some of the key differences between physical and virtual teams. There has been much discussion about whether every employee is suited to perform effectively in a virtual community. The
  • 47. consensus is that effective virtual team members need to be self-motivated, able to work independently, and able to communicate clearly and in a posi- tive way. However, given that many workers lack some or all of these skills, it seems impractical to declare that workers who do not meet these criteria should be denied the opportunity to work in virtual Table 7.1 Operating Differences between Traditional and Virtual Teams TRADITIONAL OR PHYSICAL TEAMS VIRTUAL TEAMS Teams tend to have fixed participation and members. Membership shifts based on topics and needs. Members tend to be from the same organization. Team members can include people from outside the organization (clients and collaborators). Team members are 100% dedicated. Members are assigned to multiple teams. Team members are collocated geographically and by organization. Team members are distributed geographically and by organization.
  • 48. Teams tend to have a fixed term of membership; that is, start and stop dates. Teams are reconfigured dynamically and may never terminate. Teams tend to have one overall manager. Teams have multiple reporting relationships with different parts of the organization at different times. Teamwork is physical and practiced in face-to-face interactions. Teamwork is basically social. Engagement is often during group events and can often be hierarchical in nature. Individual engagement is inseparable from empowerment. 16 9vIrtuAl te AMs And outsourCInG teams. A more productive approach might be to encourage workers to recognize that they must adapt to changing work environments at the risk of becoming marginal in their organizations. To better understand this issue, I extended the COP matrix, presented in Chapter 4, to include virtual team considerations in Table 7.2.
  • 49. Item 7 in Table 7.2 links the study of knowledge management with COP. Managing knowledge in virtual communities within an orga- nization has become associated directly with the ability of a firm to sustain competitive advantage. Indeed, Peddibhotla and Subramani (2008) state that “ virtual communities are not only recognized as important contributors to both the development of social networks among individuals but also towards individual performance and firm performance” (p. 229). However, technology-enabled facilities and support, while providing a repository for better documentation, also create challenges in maintaining such knowledge. The process of how information might become explicit has also dramatically changed with the advent of virtual team communications. For example, much technology-related documentation evolves from bottom-up sources, rather than the traditional top-down process. In effect, virtual com- munities share knowledge more on a peer-to-peer basis or through mutual consensus of the members. As a result, virtual communities have historically failed to meet expectations, particularly those of management, because managers tend to be uninvolved in
  • 50. communi- cation. While physical teams can meet with management more often before making decisions, virtual teams have no such contact available. To better understand the complexities of knowledge management and virtual teams, Sabherwal and Becerra-Fernandez (2005) expand on Nonaka’ s (1994) work on knowledge management, which outlined four modes of knowledge creation: externalization, internalization, combination, and socialization. Each of these modes is defined and discussed next. Externalization Externalization is the process of converting or translating tacit knowl- edge (undocumented knowledge) into explicit forms. The problem with this concept is whether individuals really understand what they know 170 INFORMATION TECHNOLO GY Table 7.2 Communities of Practice: Virtual Team Extensions STEP COMMUNITIES-OF- PRACTICE STEP TECHNOLOGY EXTENSION VIRTUAL
  • 51. EXTENSION 1 Understanding strategic knowledge needs: What knowledge is critical to success. Understanding how technology affects strategic knowledge and what specific technological knowledge is critical to success. Understanding how to integrate multiple visions of strategic knowledge and where it can be found across the organization. 2 Engaging practice domains: Where people form communities of practice to engage in and identify with. Technology identifies groups based on business-related benefits, requiring domains to work together toward measurable results. Virtual domains are more dynamic and can be
  • 52. formed for specific purposes and then reconfigured based on practice needs of subjects discussed. 3 Developing communities: How to help key communities reach their full potential. Technologies have life cycles that require communities to continue; treats the life cycle as a supporter for attaining maturation and full potential. Communities can be reallocated to participate in multiple objectives. Domains of discussion have no limits to reach organizational needs. 4 Working the boundaries: How to link communities to form broader learning systems Technology life cycles require new boundaries to be formed. This will link other communities that were previously
  • 53. outside of discussions and thus expand input into technology innovations. Virtual abilities allow for customer interfaces, vendors, and other interested parties to join the community. 5 Fostering a sense of belonging: How to engage people’ s identities and sense of belonging. The process of integrating communities: IT and other organizational units will create new evolving cultures that foster belonging as well as new social identities. Communities establish belonging in a virtual way. Identities are established more on content of discussion than on physical attributes of members. 6 Running the business: How to integrate communities of practice
  • 54. into running the business of the organization. Cultural assimilation provides new organizational structures that are necessary to operate communities of practice and to support new technological innovations. The organization functions more as a virtual community or team, being more agile to demands of the business, and interactions may not always include all members. (Continued) 171vIrtuAl te AMs And outsourCInG and how it might affect organizational knowledge. Virtual communi- ties have further challenges in that the repository of tacit information can be found in myriad storage facilities, namely, audit trails of e-mail communications. While Sabherwal and Becerra-Fernandez (2005)
  • 55. suggest that technology may indeed assist in providing the infrastruc- ture to access such information, the reality is that the challenge is not one of process but rather of thinking and doing. That is, it is more a process of unlearning existing processes of thinking and doing, into new modes of using knowledge that is abundantly available. Internalization Internalization is a reversal of externalization: It is the process of transferring explicit knowledge into tacit knowledge— or individual- ized learning. The individual thus makes the explicit process into his or her own stabilized thinking system so that it becomes intuitive in operation. The value of virtual team interactions is that they can provide more authentic evidence of why explicit knowledge is valu- able to the individual. Virtual systems simply can provide more people who find such knowledge useful, and such individuals, coming from a more peer relationship, can understand why their procedures can be internalized and become part of the self. Combination Combination allows individuals to integrate their physical processes
  • 56. with virtual requirements. The association, particularly in a global Table 7.2 (Continued) Communities of Practice: Virtual Team Extensions STEP COMMUNITIES-OF- PRACTICE STEP TECHNOLOGY EXTENSION VIRTUAL EXTENSION 7 Applying, assessing, reflecting, renewing: How to deploy knowledge strategy through waves of organizational transformation. The active process of dealing with multiple new technologies that accelerates the deployment of knowledge strategy. Emerging technologies increase the need for organizational transformation. Virtual systems allow for more knowledge strategy because of the ability to deploy information and procedures. Tacit knowledge is easier to
  • 57. transform to explicit forms. 172 INFORMATION TECHNOLO GY environment, allows virtual team members to integrate new explicit forms into their own, not by replacing their beliefs, but rather, by establishing new hybrid knowledge systems. This is particularly advantageous across multiple cultures and business systems in coun- tries that hold different and, possibly complementary, knowledge about how things can get done. Nonaka’ s (1994) concept of combina- tion requires participants in the community to be at later stages of multiplicity— suggesting that this form can only be successful among certain levels or positions of learners. Socialization As Nonaka (1994) notes, individuals learn by observation, imitation, and practice. The very expansion of conversations via technology can provide a social network in which individuals can learn simply through discourse. Discourse, as I discussed in Chapter 4, is the basis of successful implementations of COP. The challenge in virtual social networks is the difficulty participants have in assessing the
  • 58. authentic- ity of the information provided by those in the community. The four modes of knowledge management formulated by Nonaka (1994) need to be expanded to embrace the complexities of virtual team COPs. Most of the adjustments are predicated on the team’ s ability to deal with the three fundamental factors of ROD that I introduced in this book; that is, acceleration, dynamic, and unpre- dictability. The application of these three factors of ROD to Nonaka’ s four modes is discussed next. Externalization Dynamism The externalization mode must be dynamic and ongoing with little ability to forecast the longevity of any tacit-to-explicit formulation. In other words, tacit-to-explicit change may occur daily but may only operate effectively for a shorter period due to additional changes brought on by technology dynamism. This means that members in a community must continually challenge themselves to revisit pre- vious tacit processes and acknowledge the need to reformulate their tacit systems. Thus, transformation from tacit knowledge to explicit knowledge can be a daily challenge for COP virtual organizations.
  • 59. 173vIrtuAl te AMs And outsourCInG Internalization Dynamism Careful reflection on this process of internalizing explicit forms must be done. Given the differences in cultures and acceleration of busi- ness change, individualized learning creating new tacit abilities may not operate the same in different firm settings. It may be necessary to adopt multiple processes depending on the environment in which tacit operations are being performed. As stated, what might work in China may not work in Brazil, for example. Tacit behavior is culture oriented, so multiple and simultaneous versions must be respected and practiced. Further expansion of internalization is a virtual team’ s understanding of how such tacit behaviors change over time due to the acceleration of new business challenges. Combination Dynamism I believe the combination dynamism mode is the most important com- ponent of virtual team formation. Any combination or hybrid model requires a mature self— as specified in my maturity arcs discussed in
  • 60. Chapter 4. This means that individuals in virtual teams may need to be operating at a later stage of maturity to deal with the complexities of changing dispositions. Members of COPs must be observed, and a determination of readiness must be made for such new structures to develop in a virtual world. Thus, COP members need training; the lack of such training might explain why so many virtual teams have had disappointing results. Readiness for virtual team participation depends on a certain level of relativistic thinking. To be successful, virtual team members must be able to see themselves outside their own world and have the ability to understand the importance of what “ others” need. This position suggests that individuals need to be tested to the extent that they are ready for such challenges. Organizational learning tech- niques remain a valid method for developing workers who can cope with the dynamic changes that occur in virtual team organizations. Socialization Dynamism Socialization challenges the virtual team members’ abilities to understand the meaning of words and requires critical reflection
  • 61. 174 INFORMATION TECHNOLO GY of its constituents. ROD requires that virtual teams be agile and, especially, that they be responsive to the emotions of others in the community. This may require individuals to understand another member’ s maturity. Thus, virtual team members need to be able to understand why another member is behaving as he or she is or reacting in a dualistic manner. Assessment in a virtual collabora- tion becomes a necessity, especially given the unpredictability of technology-based projects. In Table 5.1, I showed how tacit knowledge is mapped to ROD. Table 7.3 further extends this mapping to include virtual teams. The requirements support research findings that knowledge man- agement in a virtual context has significant factors that must be addressed to improve its success. These factors include management commitment, resource availability, modification of work practices, marketing of the initiative, training, and facilitation of cultural dif- ferences (Peddibhotla & Subramani, 2008). The following are some action steps that organizations need to take to address these factors: 1. The executive team needs to advocate the commitment and support for virtual teams. The chief information officer (CIO) and his or her counterparts need to provide teams with the
  • 62. “ sponsorship” that the organization will need to endure set- backs until the virtual organization becomes fully integrated into the learning organization. This commitment can be accomplished via multiple actions, including, but not limited to, a kickoff meeting with staff, status reports to virtual teams on successes and setbacks, e-mails and memos on new vir- tual formations, and a general update on the effort, perhaps on a quarterly basis. This approach allows the organization to understand the evolution of the effort and know that virtual teams are an important direction for the firm. 2. There should be training and practice sessions with collocated groups that allow teams to voice their concerns and receive direction on how best to proceed. Practice sessions should focus on team member responsibilities and advocating their ownership of responsibility. These sessions should cover les- sons learned from actual experiences, so that groups can learn 175vIrtuAl te AMs And outsourCInG Ta bl e 7. 3 T ac it
  • 93. (C on tin ue d) 176 INFORMATION TECHNOLO GY Ta bl e 7. 3 ( C on ti nu ed ) T ac it Kn
  • 96. LT UR AL A SS IM IL AT IO N CU LT UR AL A SS IM IL AT IO N … Assignment 1 (Top priority & High-Quality work required) Please choose 1 of the 2 topics listed below list and create a one-page essay to fully answer the question.
  • 97. Topic 1: Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices. Additionally, how does the organizational structure impact competitive advantage? Topic 2: How do you define operational excellence? What factors are involved in achieving operational excellence? Who (within an organization) is responsible for operational excellence and why is this important? Submission Requirements Font: Times New Roman, size 12, double-space Citation Style: APA Length: One full page (Less than a page or more than a page will be not accepted) References: At-least 3 references Do NOT use direct quotes, rather rephrase the work and utilize in-text citations. Assignment 2 Textbook: Information Systems for Business and Beyond Please answer the following From Chapter 9 – study questions 1-10 and Exercise 3 From Chapter 10 – study questions 1-10 and Exercise 1 All the above questions should be submitted in one Word document Please understand that Plagiarism will not be tolerated Submission Requirements Font: Times New Roman, size 12, double-space Citation Style: APA Length: At-least 5 pages, make sure not to limit your work to 5 pages, but answer all the questions. References: Please use citations and references where appropriate No Plagiarism Assignment 3 Textbook: Information Technology and Organizational Learning
  • 98. Please answer the Following From Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. From Chapter 8 - Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important? Submission Requirements Font: Times New Roman, size 12, double-space Length: At least two pages Citation Style: APA References: Please use citations and references where appropriate No Plagiarism Assignment 4 Please answer the following Discuss the differences between software development and methods. Please understand that Plagiarism will not be tolerated Submission Requirements Font: Times New Roman, size 12, double-space Citation Style: APA Length: At-least 500 words References: Please use citations and references where appropriate No Plagiarism