“reconstructing” Best Practices Embedded in Software Packages: an Actor-network Perspective
نویسنده
چکیده
Management and consultants frequently preach the notion of “best practices” as a set of normative business practices that can be adopted to achieve superior organizational performance. However, the plausibility of a set of objective and context-free knowledge that can be readily acquired, stored, and transferable is questionable. Recent research has shown that “best practices” embedded in software packages can become potentially troublesome for local operations. The process by which organizations arrive at a consensus of what constitute best practices and how they recast the best practices embedded in software packages remains a black-box and presents an under-researched area of study. The research agenda is crucial, given the prevalent trend of package software adoption and that system vendors, as producers of such systems, are increasingly shaping the definition of industry best practices or standards for organizational consumers (Sawyer 2001). In this paper, we seek to open up this black box to describe and understand how the best practices embedded in software packages are reconstructed during the package implementation process. We adopt a narrative approach, to describe the negotiation and the modification of best practices during the implementation of a $14 million eprocurement system in a military organization across its 6,000 Army, Navy, and AirForce users. The adoption of a commercial-oriented software package by a large public sector organization presents a rich context to understand the process of appropriating best practices, especially given the explicit project policy of “no modification” despite obvious inherent incompatibilities. Specifically, the key best practices that were contested and renegotiated relate to the incompatibilities between the organization’s and software’s financial models (decentralized responsibility centers versus centralized vote management structure) and the acceptable security management practices (open/passive versus closed/active enforcement). Our longitudinal study uses the actant-network perspective to theorize the eventual eprocurement artifact as part of an ensemble of networked agencies and to analyze how best practices as socially enacted knowledge were inscribed in that artifact (Pentland 1995). More specifically, we trace the interactions among different agencies given their institutional histories, their conceptions of work problems and perceived goals of the technology, through their scripts of actions and rhetorical justifications used during negotiations, which eventually led to the eventual set of negotiated best practices that was inscribed upon the e-procurement artifact. By doing so, we highlight the politics and issues involved in localizing and appropriating purportedly “best practice” IT artifacts. As noted by Wagner et al. (2004), the process is not ruled by the majority – but the best practices are interpreted and constructed by a small group of actors who are able to materialize the preferred patterns of use. By opening up the black-box on the appropriation of best practices within package software, we hope to sensitize the IS
منابع مشابه
The Value of IT-Institution Alignment: A Managerial Perspective of IT-Business Alignment
Present commercial software packages (such as ERP) have incorporated management insights, industry solutions, and best-practices to facilitate IT-business alignment. However, poor alignment of IT-business still exists on a large scale in practice. In this study, we investigate the notion of IT-business alignment from a managerial perspective and argue that, in addition to the four well-studied ...
متن کاملStatistical Software for Psychology: Comparing Development Practices Between CRAN and Other Communities
Different communities rely heavily on software, but use quite different software development practices. {\bf Objective}: We wanted to measure the state of the practice in the area of statistical software for psychology to understand how it compares to best practices. {\bf Method}: We compared and ranked 30 software tools with respect to adherence to best software engineering practices on items ...
متن کاملActor-network Inspired Design Research: Methodology and Reflections
This paper describes how Actor-network theory, an approach to sociological analysis which comes from the field of Science and Technology Studies, can be used in the analysis of field work for design research. A case study of the investigation of the use of speech recognition dictation software is used to present an actor-network approach to the analysis of field work for design. Using an actor-...
متن کامل'Best' for whom?: the tension between 'best practice' ERP packages and diverse epistemic cultures in a university context
The idea that so-called ‘best’ business practices can be transferred to organizations when they purchase enterprise resource planning (ERP) software packages is a major selling point of these packages. Yet recent research has illustrated a gap between the espoused theory of a best practice solution and the theory-in-use experienced by those who install software with such a design. As researcher...
متن کاملThe Symbiosis of Human and Semantic Technology Through the Lens of Actor-Network Theory
Background: Semantic technologies (STs) have made machine reasoning possible by providing intelligent data management methods. This capability has created new forms of interaction between humans and STs, which is called "semantic interaction." The increasing spread of this form of interaction in daily life reveals the need to identify the factors affecting it and introduce the requirements of...
متن کامل