Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Information Systems Management And Strategy (TA) Add in library

349 Download14 Pages 3,377 Words


• To promote an understanding of the role of Information System (IS) in the strategic management and planning of an enterprise;

• To promote an understanding of the interaction of IT with the structure, operating principles and culture of an enterprise;

• To equip students with an understanding of the application of emerging Information Technologies in business processes.

• To promote an understanding of the need for, and the techniques of, introducing change and innovation into an organisation, especially the introduction or expansion of IT.

• To enable students to develop skills needed to design and model Decision Support Systems (DSS) for industrial computing applications.



Statements that ideal financial commitment opportunities in technology (IT) are important to firms’ long-term success are now considered as truisms. The fact behind these truisms, however, is that IT financial commitment opportunities matter only as far as IT abilities become included in new business exercise Doherty and Terry, 2009) (Galliers and Currie, 2011) (Andersen and Vendelø, 2004) (Peppard and Ward, 2004) (Overby, Bharadwaj and Sambamurthy, 2006). IS (Information Systems) techniques should therefore supplement high-level business financial commitment objectives and recognize IT-enabled business changes necessary to recognize them (Reich and Benbasat, 1996). While much attention is compensated to the task of aiming a firm’s ideal purpose with financial commitment opportunities in IT abilities (Chan and Reich, 2007) (Chan, Huff and Copeland, 1997) and the task of organizationally applying those IT abilities (Markus, 2004) (Orlikowski, 2000) however, few is still known of how to apply the nearby ideal modify issue for IS technique exercise and research (Nolan, 2012) (Ward, 2012) (Galliers et al., 2012). To this end, we ask how and why effective business execution of new IT abilities that arrange with ideal purpose often results in surprising results (cf. Markus and Robey, 2004 and Robey and Boudreau, 1999) in that they don't succeed to generate designed ideal results (cf. Franz et al., 1986 and Robey, 1981). We brand this result technique blindness: the business incapability to recognize the ideal purpose of applied, available IT abilities.

Adopting a strategy-as-practice viewpoint Jarzabkowski and Paul Spee, 2009), we concentrate on how located stars and connected business methods (Styhre, 2003) formed the execution of a new manufacturing control program. The results are unorthodox: Officially, the execution was effective as the program became included in business workouts and the work considered the execution as a success. Tactically, however, the execution unsuccessful, as it did not generate designed business change; instead of successfully using the new program to allow the new ideal purpose, the program was successfully applied to recreate current methods. Essentially, the company seems to be stubbornly and strategically sightless. The purpose is to understand this situation and discover why some companies become surrounded in technique loss of sight rather than advertising ideal modify.


Related research

In the latest evaluation, (Chen et al., 2010) recognized three chronic lengths within IS technique research (Galliers et al., 2014) (Ward and Peppard, 2002):

Alignment of computer with business technique

Strategic details program planning to recognize such domain portfolios of techniques and

The resulting use of particular techniques, or their mixtures, for aggressive benefits

Regardless of which string is being analysed, extant analysis represents that any IS technique will depend on the way it is introduced. It is therefore crucial to sustain limited linkages between the firm’s ideal purpose, the following IS technique execution and the de facto noticed technique. This indicates three key difficulties to effective IS technique implementation (Piccoli and Ives, 2005):

To accomplish theoretical positioning between ideal purpose and program capabilities;

To apply the program organizationally and

To form the use of the program and relevant methods to accomplish realistic positioning with the ideal purpose. We evaluation each of these difficulties next.

The ability to develop and sustain ideal purpose is main to any effective IS technique. An ideal purpose envisions a preferred management place and determines the requirements the company will use to graph its improvement (Hamel and Prahalad, 2005). Accordingly, companies that display a regular ideal purpose will spend their sources successfully and take part in aggressive actions that help accomplish their goals – such as options of IT techniques and abilities (Thompson et al., 2010). While any large IS venture includes the set-up of program goals and choice of IT abilities necessary to accomplish preferred results (Keil, Mann and Rai, 2000), the first task features how chosen program goals and abilities do not always capable with the organization’s ideal purpose (Mähring et al., 2004).

Even when the chosen program abilities arrange with the recognized ideal purpose, however, the program execution itself often shows another ideal task (Galliers and Leidner, 2012) (Galliers and Leidner, 2003). Although obvious misalignments between ideal purpose and program abilities are obvious in several unsuccessful ideal IS implementations (Wagner and Newell, 2004), it is often the lack of ability to apply the strategically aligned program that causes an IS technique procedure to don't succeed. In a feeling, the idea of an effective business execution as aspect of an effective IS technique has been aspect of the key presumptions of IS technique literary works, though not always clearly mentioned. In fact, though unsuccessful, imperfect or insufficient implementations of IT techniques are plentiful in their ideal perspective (Leonard-Barton, 1988) (Soh and Sia, 2004) (Boudreau and Robey, 2005), IS technique literary works generally characterizes the execution as a necessary and unavoidable procedure of common variation towards ultimate ideal positioning. Trying to prevent associated problems, we contemplate the second ideal task as concerning the ability to apply the program both on time and with appropriate risk, and in ways that meet the objectives of customers.

Due to the surprising ways in which IT becomes appropriated in regional exercise (Barley, 1986), however, not even an otherwise effective execution of a tactically arranged program can make sure that ideal intents happen. Knowing the crucial and complicated part that methods perform in forming how IT techniques are introduced is thus key for effective IS technique execution. Unfortunately, conceptualizations of ideal IT use within companies generally relax on the innocent supposition that, for the program to be tactically effective, the IT program must just be efficiently ‘embedded’ in appropriate methods. Successful IS technique execution, however, progressively indicates punctuation i.e. methodical re-structuring and re-arranging of business methods (Henderson and Venkatraman, 1992). In circumstances recognized either by strong, surprising imbalance between inconsistent business components and the new IT program, or where regional methods proceed the same, positioning between the IT program and ideal purpose will never be achieved and the ideal IS execution will thus certainly don't succeed. Therefore, the third ideal task issues the business ability to create IT-enabled change: changing and re-configuring regional methods to arrange both program use and relevant business methods with the ideal purpose.

While a significant task for the IS technique area will keep be that of working with the complexness of how each of these three difficulties perform out in powerful, networked financial and governmental circumstances (Merali, Papadopoulos and Nadkarni, 2012), we think that the last task is the least recognized. Although IS analysis has mostly did not identify this task in its own right, substitute theoretical presumptions, such as those provided by the strategy-as-practice viewpoint used here, keep great guarantee. In watching the IS technique procedure as a package of located, realistic achievements, it is indeed well prepared to elucidate the simple communications between difficulties on the one side and the realistic establishing on the other. In so doing, it can offer key ideas into how and why effective business execution of new and tactically arranged IT abilities sometimes is not able to convert current methods. To this end, we next evaluation the analysis on strategy-as-practice and talk about the idea of intellectual entrenchment (DANE, 2010), which we claim is a typical cause for the kind of ideal failing we contact technique loss of sight.



By disagreeing that technique analysis has missing vision of humans (Whittington, 2003) and incorrectly decreased way to a few causally-related company and ecological factors (Jarzabkowski, Balogun and Seidl, 2007), the strategy-as-practice viewpoint indicates the need to comprehend why and what ideal stars do as they build, apply and recognize ideal intents; scientists have, for example, generally examined how these procedures are formed by actors’ feelings, inspirations and public and governmental communications and the circumstances in which they act (Whittington, 2006). Against this background, the strategy-as-practice viewpoint guides interest to the exercise of technique – strategizing – and the methods stars attract upon to rationalize and legitimize both the long run state they aim to carry and the actions they take to accomplish this end.

The strategy-as-practice viewpoint resonates with latest components of IS technique analysis which strengthen the concept that IT issues only when it becomes included in local methods. As exercise, IS technique looks for to recognize the prospective value of IT by re-defining and re-focusing the part of IT within companies. In so doing, methods often have to be re-configured in order for value to be noticed; indeed, extant analysis keeps that company value based on IT investment strategies mainly comes out through company changes and relevant enhancements (Grover and Kohli, 2012) (Mathiassen and Sørensen, 2008). As the ideal part of IT progressively changes from assisting company methods to enabling strong company modify, knowing how and why IT becomes regionally included in a particular way is therefore an increasing issue. It is against this background that we ask how and why some companies don't succeed to generate company modify despite having efficiently applied new ideal IT.

In this document, we increase the intellectual creating literary works by spending particular interest to the concept of intellectual entrenchment. (DANE, 2010) described intellectual entrenchment as an advanced stage of balance in an actor’s sector schemata. In the same way, (Sanger and Singh, 2012) considered it as the lack of ability to unfreeze schemata that damage decision-making. Entrenchment is, thus, a situation in which set, constant supports create methods sightless to changes in their atmosphere. As schemata create over time, entrenchment can be associated with balance and fixity of practices; recurring initial of a particular schema tends to strengthen the framework and creates upcoming modifications progressively unlikely (Fiske and Taylor, 1984). While such normative positioning of believed and activity may be unproblematic or even valuable in constant surroundings (Feltovich, Ford and Hoffman, 1997), or to companies that aim to secure culturally normative styles of considering (Dane, 2010), entrenchment can be expensive when versatility is required, as is generally the situation with ideal modify. Indeed, as schemata impact how stars think about activities (Cooper and Shallice, 2006) (Henderson and Hollingworth, 1999), intellectual entrenchment prevents troubleshooting, regional variation and innovative concept creation (Dane, 2010). Accordingly, intellectual entrenchment can generate important limitations to business modify and, consequently, the knowing of ideal purpose.

By connecting constant methods to set interaction, details and definitions, these intellectual records speak out loud with seminal exercise records. Indeed, actors’ schemata cannot quickly be divided from exercise as contained in the knowing that arrange an exercise are those conceptual knowing, given which the definitions of the companies organized in the exercise are instituted. From an exercise viewpoint, intellectual entrenchment may, then, be a key to knowing how and why technique loss of sight is produced; it allows comprehend how and why ideal IT techniques are applied and consequently used in methods that don't succeed to generate the designed ideal results.



The multi-dimensional, practice-based perspective of IS technique has several effects. First, it enhances and expands the literary works on IS technique by outlining the complicated complications engaged in IS technique exercise. Despite being an important task to IS technique, IS literary works has not effectively included the fact that ideal purpose is not always noticed, even when the program is tactically arranged and the IT execution is effective (Robey, Ross and Boudreau, 2002). This document demonstrates how intellectual entrenchment and associated fixity of located methods can greatly affect the methods in which change-recipients – such as venture groups – structure, and thus deal with, the designed modify and how this, in turn, may shape the execution and following IT use in methods that make technique problems despite effective execution of tactically arranged techniques. Having shown the ability of the theoretical perspective to account for the real-world complexness of the IS technique execution, we indeed wish that we have motivated further research of ideal IS implementations as unfolding, included procedures, inseparable from the methods they aim to modify.

Second, process sectors are, for explanations, often risk-averse. A risk-averse social DNA might confirm particularly complicated when applying techniques that require changes in complicated techniques of exercise – such as extremely interdependent, reliable procedures. Indeed, at the same time undetermined, the research indicates a connection between high levels of conservatism and intellectual entrenchment (Dane, 2010). These results are reliable with past analysis displaying that, where threats surpass benefits, changes are likely to be opposed (Beaudry and Pinsonneault, 2005) and that culturally normative methods will be secured (Dane, 2010). As modify actually happens upon threat, this indicates a continuous trade-off between program execution threat and technique understanding, another area where this research and its associated strategy-as-practice perspective of IS technique reveals up effective places for further analysis.

Last, we promote IS technique exercise by characterizing IS technique multi-dimensionally and indicating how companies need to consider all measurements in their IS technique exercise. Although the research provides with one specific commercial IT program, the results provide useful generalizable ideas for other IS technique projects. This contains the conceptualization of technique loss of sight as a serious, but under-appreciated issue, along with the associated conceptualization of three important difficulties that strategists have to get over during IS technique execution. By unpacking these measurements, this document also provides wealthy base for further theorizing. While an exercise lens may help us better understand each of these difficulties in solitude, we claim that it can be particularly beneficial in proposition out the reasons that occur across the different size of ideal IS execution as they interact with business exercise. Thus, the design both features and reveals several effective places for further practice-oriented analysis within the IS strategy-as-practice flow. As an example, discovering the procedures by which technique loss of sight is (re)produced – and the means by which it can be prevented or settled – provides exciting possibilities for upcoming IS technique analysis. More analysis is thus needed to make the ideas we have offered here, both conceptually and with regards to realistic effects.



This analysis reveals an unfolding shift in the way in which IS technique is designed. This shift can be considered in at least two methods. First, IS technique, as we know it, is at possibilities with the growing scenery of IS strategy-as-practice. If the area is to progress and completely appreciate the reasons engaged in IS technique execution, a multi-dimensional perspective of IS technique is required. While pleasant additions, we believe that we have made some useful actions toward conceptualizing such a perspective. Second, the shift indicates a wealthy chance of upcoming analysis. In particular, there is a need for longitudinal research analysing IS strategy-as-practice as designed here. This research recognizes several places for such analysis and, through cases, reveals how the perspective designed herein can be used to produce novel, exciting ideas. Indeed, we desire to see a flow of practice-based analysis appear that looks into the difficulties that we have only started to discover.



[1] Andersen, K. and Vendelø, M. (2004). The past and future of information systems. Oxford: Elsevier.

[2] Barley, S. (1986). Technology as an Occasion for Structuring: Evidence from Observations of CT Scanners and the Social Order of Radiology Departments. Administrative Science Quarterly, 31(1), p.78.

[3] Beaudry, A. and Pinsonneault, A. (2005). Understanding user responses to information technology: a coping model of user adaptation. MIS Quart., 29(3), pp.493-524.

[4] Boudreau, M. and Robey, D. (2005). Enacting Integrated Information Technology: A Human Agency Perspective. Organization Science, 16(1), pp.3-18.

[5] Chan, Y. and Reich, B. (2007). IT alignment: what have we learned?. J Inf Technol, 22(4), pp.297-315.

[6] Chan, Y., Huff, S. and Copeland, D. (1997). Assessing realized information systems strategy. The Journal of Strategic Information Systems, 6(4), pp.273-298.

[7] Chen, D., Mocker, M., Preston, D. and Teubner, A. (2010). Information systems strategy: reconceptualization, measurement and implications. MIS Quart, 34(2), pp.233–259.

[8] Cooper, R. and Shallice, T. (2006). Hierarchical schemas and goals in the control of sequential behavior. Psychological Review, 113(4), pp.887-916.


[10] Doherty, N. and Terry, M. (2009). The role of IS capabilities in delivering sustainable improvements to competitive positioning. The Journal of Strategic Information Systems, 18(2), pp.100-116.

[11] Feltovich, P., Ford, K. and Hoffman, R. (1997). Expertise in context. Menlo Park, Calif.: AAAI Press.

[12] Fiske, S. and Taylor, S. (1984). Social cognition. Reading, Mass.: Addison-Wesley Pub. Co.

[13] Galliers, R. and Currie, W. (2011). The Oxford Handbook of Management Information Systems. Oxford: OUP Oxford.

[14] Galliers, R. and Leidner, D. (2003). Strategic information management. Oxford: Butterworth-Heinemann.

[15] Galliers, R. and Leidner, D. (2012). Strategic Information Management. Hoboken: Taylor & Francis.

[16] Galliers, R., Jarvenpaa, S., Chan, Y. and Lyytinen, K. (2012). Strategic information systems: Reflections and prospectives. The Journal of Strategic Information Systems, 21(2), pp.85-90.

[17] Galliers, R., Leidner, D., Leidner, D. and Galliers, R. (2014). Strategic information management. London: Routledge, Taylor and Francis.

[18] Grover, V. and Kohli, R. (2012). Cocreating IT value: new capabilities and metrics for multifirm environments. MIS Quart., 36(1), pp.225–232.

[19] Hamel, G. and Prahalad, C. (2005). Strategic intent. Harvard Bus. Rev., 83(7), pp.148–161.

[20] Henderson, J. and Hollingworth, A. (1999). HIGH-LEVEL SCENE PERCEPTION. Annu. Rev. Psychol., 50(1), pp.243-271.

[21] Henderson, J. and Venkatraman, N. (1992). Strategic alignment: a model for organizational transformation through information technology. New York: Oxford University Press, pp.97–116.

[22] Jarzabkowski, P. and Paul Spee, A. (2009). Strategy-as-practice: A review and future directions for the field. International Journal of Management Reviews, 11(1), pp.69-95.

[23] Jarzabkowski, P., Balogun, J. and Seidl, D. (2007). Strategizing: The challenges of a practice perspective. Human Relations, 60(1), pp.5-27.

[24] Keil, M., Mann, J. and Rai, A. (2000). Why Software Projects Escalate: An Empirical Analysis and Test of Four Theoretical Models. MIS Quarterly, 24(4), p.631.

[25] Leonard-Barton, D. (1988). Implementation as mutual adaptation of technology and organization. Research Policy, 17(5), pp.251-267.

[26] Mähring, M., Holmström, J., Keil, M. and Montealegre, R. (2004). Trojan actor‐networks and swift translation. Information Technology & People, 17(2), pp.210-238.

[27] Markus, M. (2004). Technochange management: using IT to drive organizational change. J Inf Technol, 19(1), pp.4-20.

[28] Mathiassen, L. and Sørensen, C. (2008). Towards a theory of organizational information services. J Inf Technol, 23(4), pp.313-329.

[29] Merali, Y., Papadopoulos, T. and Nadkarni, T. (2012). Information systems strategy: Past, present, future?. The Journal of Strategic Information Systems, 21(2), pp.125-153.

[30] Nolan, R. (2012). Ubiquitous IT: The case of the Boeing 787 and implications for strategic IT research. The Journal of Strategic Information Systems, 21(2), pp.91-102.

[31] Orlikowski, W. (2000). Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations. Organization Science, 11(4), pp.404-428.

[32] Overby, E., Bharadwaj, A. and Sambamurthy, V. (2006). Enterprise agility and the enabling role of information technology. European Journal of Information Systems, 15(2), pp.120-131.

[33] Peppard, J. and Ward, J. (2004). Beyond strategic information systems: towards an IS capability. The Journal of Strategic Information Systems, 13(2), pp.167-194.

[34] Piccoli, G. and Ives, B. (2005). IT-dependent strategic initiatives and sustained competitive advantage: a review and synthesis of the literature. MIS Quart., 29(4), pp.747–776.

[35] Reich, B. and Benbasat, I. (1996). Measuring the Linkage between Business and Information Technology Objectives. MIS Quarterly, 20(1), p.55.

[36] Robey, D., Ross, J. and Boudreau, M. (2002). Learning to implement enterprise systems: an exploratory study of the dialectics of change. J. Manage. Inform. Syst., 19(1), pp.17-46.

[37] Sanger, S. and Singh, J. (2012). Breaking free: understanding leadership entrenchment and disruptive strategies. 2nd International Conference on Engaged Management Scholarship.

[38] Soh, C. and Sia, S. (2004). An institutional perspective on sources of ERP package–organisation misalignments. The Journal of Strategic Information Systems, 13(4), pp.375-397.

[39] Styhre, A. (2003). The practice turn in contemporary theory. Scandinavian Journal of Management, 19(3), pp.395-398.

[40] Wagner, E. and Newell, S. (2004). ‘Best’ for whom?: the tension between ‘best practice’ ERP packages and diverse epistemic cultures in a university context. The Journal of Strategic Information Systems, 13(4), pp.305-328.

[41] Ward, J. (2012). Information systems strategy: Quo vadis?. The Journal of Strategic Information Systems, 21(2), pp.165-171.

[42] Ward, J. and Peppard, J. (2002). Strategic planning for information systems. Chichester, West Sussex, England: J. Wiley.

[43] Whittington, R. (2003). The work of strategizing and organizing: for a practice perspective. Strategic Organization, 1(1), pp.117-125.

[44] Whittington, R. (2006). Completing the Practice Turn in Strategy Research. Organization Studies, 27(5), pp.613-634.

For years now, is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.

Most Downloaded Sample of Management

274 Download1 Pages 48 Words

Toulin Method Of Argumentation

You are required to write a researched argument essay that convinces persuades the reader of your position / stance. This is an academic, researched and referenced do...

Read More Tags: Australia Arlington Management Management University of New South Wales Management 
202 Download9 Pages 2,237 Words

Consumer Behavior Assignment

Executive Summary The purpose of this report is to elaborate the factors which are considered by individuals before selecting an occupation. Choosing an occupati...

Read More Tags: Australia Arlington Management Management University of New South Wales Management 
367 Download13 Pages 3,112 Words

Internet Marketing Plan For River Island

Introduction With the increase enhancement in the field of technology, it has been considered essential by the businesses to implement such technology in their b...

Read More Tags: Australia Arlington Management Management University of New South Wales Management 
328 Download9 Pages 2,203 Words

Strategic Role Of HR In Mergers & Acquisitions

Executive Summary In a merger & acquisition, role of an HR has emerged as a very critical function. At each stage of merger and acquisition process, HR plays a s...

Read More Tags: Australia Arlington Management Management University of New South Wales Management 
355 Download7 Pages 1,521 Words

Relationship Between Knowledge Management, Organization Learning And HRM

Introduction In this competitive business environment where every business organization is trying to attract the customers of each other, it becomes essential for ...

Read More Tags: Australia Arlington Management Management University of New South Wales Management 
Free plagiarismFree plagiarism check online on mobile
Have any Query?