Crossing the Line: Overcoming Knowledge Boundaries in Enterprise Transformation
نویسندگان
چکیده
Enterprise transformations are fundamental changes in an organization. Such changes typically affect different stakeholder groups (e.g., program managers, business managers) that exhibit a significant diversity regarding their members’ knowledge, goals, and underlying assumptions. Yet, creating shared understanding among diverse stakeholder groups in transformations is a main antecedent for success. In this paper, we analyze which properties of enterprise architecture models contribute to syntactic, semantic, and pragmatic capacities and thereby help to create shared understanding among stakeholder groups involved in enterprise transformation. We assess the differences among stakeholder groups through the lens of knowledge boundaries, and enterprise architecture models through the lens of boundary objects. We develop and empirically test a research model that describes which boundary object properties are required to overcome three progressively complex knowledge boundaries—syntactic, semantic, and pragmatic. Our findings show which boundary object properties contribute to a respective capacity needed to overcome each of the three knowledge boundaries. Specifically, we find that for (1) a syntactic capacity, concrete and modular EA models are helpful; (2) a semantic capacity, visual EA model properties are relevant, and (3) a pragmatic capacity, broad stakeholder participation is conductive.
منابع مشابه
Cross Boundary Knowledge Management Mechanisms by Key Users in ES Implementation
Key users play an essential role in the implementation of enterprise systems (ES), undertaking a great deal of knowledge management. However, this important phenomenon has been largely overlooked by the extant literature. Drawing upon theories on cross boundary knowledge management, this research addresses why key users can facilitate cross boundary knowledge management, and how they do it. Thi...
متن کاملCan boundary objects mitigate communication defects in enterprise transformation? Findings from expert interviews
Inappropriate communication is a major threat to enterprise transformations. While enterprise architecture (EA) models may be helpful to support communication, these models are often tailored to the needs of specialists like enterprise architects. Based on empirical data from 12 expert interviews, we analyze how EA models can become boundary objects that span knowledge boundaries and alleviate ...
متن کاملAddressing the Causes and Failure for Financial Transformation while Achieving Business Alignment
The financial transformation journey is often addressed through trying to avoid the pitfalls associated with the causes of failure while leveraging the critical success factors. At best, Chief Financial Officers adopting this approach are likely to improve the degree of customer service experienced by Finance department. This is unlikely to lead to sustainable financial transformation being ach...
متن کاملCROSSING ORGANIZATIONAL BOUNDARIES FOR INNOVATION Probing Knowledge Transformation in the Context of Interorganizational Collaborative Strategy Process Development
OF DOCTORAL DISSERTATION AALTO UNIVERSITY SCHOOL OF SCIENCE AND TECHNOLOGY P.O. BOX 11000, FI-00076 AALTO Author Pauli Alin Name of the dissertation Crossing organizational boundaries: Probing knowledge transformation in the context of interorganizational collaborative strategy process development Manuscript submitted 5 February 2010 Manuscript revised 26 March 2010 Date of the defence 21 May 2...
متن کاملSimulation of Ideal External and Internal Flows with Arbitrary Boundaries Using Schwarz Christoffel Transformation
The flow field, velocity and pressure coefficient distribution of some 2-D ideal flows are presented. Conformal mapping is used to simulate two-dimensional ideal flow for a variety of complex internal and external configurations, based on the numerical integration of Schwarz-Christoffel transformation. The advantages of this method are simplicity and high accuracy. The method presented in this ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Business & Information Systems Engineering
دوره 57 شماره
صفحات -
تاریخ انتشار 2015