Covert End User Development: A Study of Success

Covert End User Development: A Study of Success

Elaine H. Ferneley (University of Salford, UK)
DOI: 10.4018/978-1-60566-136-0.ch012
OnDemand PDF Download:
$37.50

Abstract

End user development (EUD) of system applications is typically undertaken by end users for their own, or closely aligned colleagues, business needs. EUD studies have focused on activity that is small scale, is undertaken with management consent and will ultimately be brought into alignment with the organisation’s software development strategy. However, due to the increase pace of today’s organisations EUD activity increasing takes place without the full knowledge or consent of management, such developments can be defined as covert rather than subversive, they emerge in response to the dynamic environments in which today’s organisations operate. This chapter reports on a covert EUD project where a wide group of internal and external stakeholders worked collaboratively to drive an organisation’s software development strategy. The research highlights the future inevitability of external stakeholders engaging in end user development as, with the emergence of wiki and blog-like environments, the boundaries of organisations’ technological artifacts become increasingly hard to define.
Chapter Preview
Top

Literature Review

Authors have begun to recognise the futility of attempting to align business strategy and technological infrastructures and have acknowledged that technological “drift” is inevitable, (Ciborra et al., 2000; Sauer & Burn, 1997; Ciborra, 1994; Orlikowski, 1996). This process of “drift” is largely assumed to be an overt process, management being aware that it is happening and either attempting realignment (usually futilely) or allowing the technology to develop a certain momentum of its own (for examples see Kanellis & Paul, 2005; Hanseth & Braa, 1998; Rolland & Monteiro, 2002). What is less frequently considered is the notion of, and rationale for, covert IT implementations that result in “drift,” and the literature that does exist is primarily concerned with covert activity with the intention of sabotage (for examples see Gordon, 1996; Conti, 2005; Verton, 2001; Graham, 2004).

Such covert activity, whether for altruistic or subversive purposes, necessitates a degree of improvisation—using current resources to create new forms and order from tools and materials at hand, such an approach has been defined by anthropologists as “bricolage” (Levi-Strauss, 1966). When considering information systems bricolage, “materials at hand” are usually considered to be information technology hardware and software artefacts. However, it has also been suggested that the use of networking with preexisting professional and personal contacts is also a form of “network bricolage” (Mintzberg, 1994; Moorman & Miner, 1998; Baker, Miner, & Eesley, 2003).

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Steve Clarke
Chapter 1
Jeremy Fowler
Although the discipline of information systems (IS) development is well established, IS failure and abandonment remains widespread. As a result, a... Sample PDF
Information Systems Success and Failure—Two Sides of One Coin, or Different in Nature? An Exploratory Study
$37.50
Chapter 2
Jeanette Eriksson, Yvonne Dittrich
This chapter reports on a case study performed in cooperation with a telecommunication provider. The telecom business changes rapidly as new... Sample PDF
Achieving Sustainable Tailorable Software Systems by Collaboration Between End-Users and Developers
$37.50
Chapter 3
Marvin D. Troutt, Douglas A. Druckenmiller, William Acar
This chapter uses some special usability and ethical issues that arise from experience with what can be called captive end-user systems (CEUS).... Sample PDF
Usability, Testing, and Ethical Issues in Captive End-User Systems
$37.50
Chapter 4
Jonathan P. Caulkins, Erica Layne Morrison, Timothy Weidemann
Spreadsheets are commonly used and commonly flawed, but it is not clear how often spreadsheet errors lead to bad decisions. We interviewed 45... Sample PDF
Do Spreadsheet Errors Lead to Bad Decisions? Perspectives of Executives and Senior Managers
$37.50
Chapter 5
Lixuan Zhang, Randall Young, Victor Prybutok
The means by which the U.S. justice system attempts to control illegal hacking are practiced under the assumption that hacking is like any other... Sample PDF
A Comparison of the Inhibitors of Hacking vs. Shoplifting
$37.50
Chapter 6
Dewi Rooslani Tojib
he last decade has seen the proliferation of business-to-employee (B2E) portals as integrated, efficient, and user-friendly technology platform to... Sample PDF
Developing Success Measure for Staff Portal Implementation
$37.50
Chapter 7
Peter Baloh
Improving how knowledge is leveraged in organizations for improved business performance is currently considered as a major organizational change.... Sample PDF
Contingencies in the KMS Design: A Tentative Design Model
$37.50
Chapter 8
Beryl Burns
We report the findings of a field study of the enactment of ICT supported knowledge work in a Human Resources contact centre, illustrating the... Sample PDF
Users as Developers: A Field Study of Call Centre Knowledge Work
$37.50
Chapter 9
Raymond R. Panko
This chapter describes two experiments that examined overconfidence in spreadsheet development. Overconfidence has been seen widely in spreadsheet... Sample PDF
Two Experiments in Reducing Overconfidence in Spreadsheet Development
$37.50
Chapter 10
Steven John Simon, David Paper
Voice recognition technology-enabled devices possess extraordinary growth potential, yet some research indicates that organizations and consumers... Sample PDF
User Acceptance of Voice Recognition Technology: An Empirical Extension of the Technology Acceptance Model
$37.50
Chapter 11
Peter P. Mykytyn
Colleges of business have dealt with teaching computer literacy and advanced computer application concepts for many years, often with much... Sample PDF
Educating Our Students in Computer Application Concepts: A Case for Problem-Based Learning
$37.50
Chapter 12
Elaine H. Ferneley
End user development (EUD) of system applications is typically undertaken by end users for their own, or closely aligned colleagues, business needs.... Sample PDF
Covert End User Development: A Study of Success
$37.50
Chapter 13
Steven Hornik, Richard D. Johnson, Yu Wu
Central to the design of successful virtual learning initiatives is the matching of technology to the needs of the training environment. The... Sample PDF
When Technology Does Not Support Learning: Conflicts Between Epistemological Beliefs and Technology Support in Virtual Learning Environments
$37.50
Chapter 14
Tom Butler
The study’s objective is to arrive at a theoretical model and framework to guide research into the implementation of KMS, while also seeking to... Sample PDF
A Theoretical Model and Framework for Understanding Knowledge Management System Implementation
$37.50
Chapter 15
Jun Xu, Mohammed Quaddus
This chapter develops a model of adoption and continued use of knowledge management systems (KMSs), which is primarily built on Rogers’ (1995)... Sample PDF
Exploring the Factors Influencing End Users' Acceptance of Knowledge Management Systems: Development of a Research Model of Adoption and Continued Use
$37.50
Chapter 16
Wei-Na Lee
In today’s global environment, a myriad of communication mechanisms enable cultures around the world to interact with one another and form complex... Sample PDF
Classifying Web Users: A Cultural Value-Based Approach
$37.50
Chapter 17
Annette Hallin, Kristina Lundevall
This chapter presents the mCity Project, a project owned by the City of Stockholm, aiming at creating user-friendly mobile services in collaboration... Sample PDF
mCity: User Focused Development of Mobile Services Within the City of Stockholm
$37.50
Chapter 18
Cristina Hava Muntean, Gabriel-Miro Muntean
Lately, user quality of experience (QoE) during their interaction with a system is a significant factor in the assessment of most systems. However... Sample PDF
End-User Quality of Experience-Aware Personalized E-Learning
$37.50
Chapter 19
High-Tech Meets End-User  (pages 302-320)
Marc Steen
One challenge within the high-tech sector is to develop products that end users will actually need and will be able to use. One way of trying to... Sample PDF
High-Tech Meets End-User
$37.50
About the Contributors