Posts

Information Systems ‘Backsourcing’: Knowledge Re-integration Challenges

Akshay Bhagwatwar (University of Washington), Ray Hackney (Brunel University), and I have authored a paper that examines the knowledge integration challenges faced by organizations as they try to recover from backsourcing endeavors. The paper will appear in a future issue of Information Systems Management.

Abstract
Backsourcing is motivated by opportunities arising from changes in the business situation, redefinition of the character of outsourced service declining in quality or due to the discovery of flaws in the contract. The situation of backsourcing clearly has major implications for an organization in terms of monetary investments, IS infrastructure and changes in employee requirements during and after the process. The research in this paper consequently acknowledges a serious challenge involving the management of systems within organizations following backsourcing events. This paper considers a detailed analysis of two case studies of backsourcing: JP Morgan Chase (USA) and Sainsbury (UK). A major contribution of the paper is to identify important strategies to be followed in backsourcing projects to ensure efficient knowledge re-integration. In this respect, it is believed the paper is unique in identifying emergent suggestions for strategic backsourcing decision making through a series of insightful observations.

Bhagwatwar, A., Hackney, R., and Desouza, K.C. “Considerations for Information Systems ‘Backsourcing’: A Framework for Knowledge Re-integration,” Information Systems Management, Forthcoming.

Cyberprotest in Contemporary Russia forthcoming in Technology Forecasting and Social Change

Volodymyr V. Lysenko and I have authored paper that explores the possibilities of the Internet as a tool for supplying information necessary for the organization and mobilization of successful opposition movements, especially under non-democratic regimes. Examples of the roles the Internet plays in the political processes in Russia are discussed in detail. In particular, the recent cyberprotest cases of the Ingushetiya.ru website and the movement to release political prisoner Svetlana Bakhmina are investigated. Besides showing the Internet’s significant role in organizing modern protests, these cases also demonstrate that in environments where practically all traditional mass-media are under the authorities’ control, the Internet becomes the major source of alternative information. Our paper offers a look at how deploying technologies can bring about social change, even in some of the most difficult political environments.

The paper will appear in Technology Forecasting and Social Change. Volodymyr and I will present the paper at the Harriman Institute for the Etiology and Ecology of Post-Soviet Media Conference at Columbia University on May 7-9, 2010.

Measuring Agility of Networked Organizational structures via Network Entropy and Mutual Information

Yuan Lin, Sumit Roy, and I have authored a paper that examines the use of network entropy and mutual information to measure the agility of networked organizational structures. The paper will appear in Applied Mathematics and Computation.

Abstract
While the agility of networked organizational structures is important for organizational performance, studies on how to evaluate it remain scant, probably because the difficulty in measuring network evolution. In this conceptual paper, we propose two measures – network entropy and mutual information – to characterize the agility of networked organizational structure. Rooted in graph theory and information theory, these two measures capture network evolution in a comprehensive and parsimonious way. They indicate the uncertainty (or disorder) at the network level as well as the degree distribution at the individual level. We also propose an algorithm for applying them in the scenario of adding links to a network while holding the number of nodes fixed. Both simulated and real networks are used for demonstration. Implications and areas for future research are discussed in the end.

Lin, Y., Desouza, K.C., and Roy, S. “Measuring Agility of Networked Organizational structures via Network Entropy and Mutual Information,” Applied Mathematics and Computation, Forthcoming.

Speaking at the Harriman Institute at Columbia University on Political Cyberprotest in Contemporary Russia

I will be presenting a paper at the Harriman Institute at Columbia University. The paper, Political Cyberprotest in Contemporary Russia, co-authored with Volodymyr Lysenko, a doctoral student of mine at the University of Washington Information School, was accepted for the Etiology and Ecology of Post-Soviet Media Conference (May 7-9, 2010).

Technologies may be intertwined with politics. In particular, the Internet has the potential to cause enormous social and political changes in today’s society. In this research we discuss possibilities of the Internet as a tool for supplying information necessary for organization and mobilization of the successful oppositional movements, especially under the non-democratic regimes. We pay special attention to: in-built capabilities of the Internet to promote active popular involvement in the political process; possibilities of the Internet for democratization of authoritarian regimes; attempts at Internet censorship and possibilities to counteract them; the roles that the new Internet-based media are playing in the power shift in society; the roles that the Internet played in the success of the color revolutions in former Soviet countries; and the roles that new information elites play in social change. We discuss in detail recent examples of the roles the Internet plays in the political processes in Russia.

While in free societies opposing political forces have practically unlimited access to mass media, in Russia the authorities control almost all traditional means of mass information.  Only the Internet retains the possibility of limiting control by the Russian authorities. Thus the purpose of our research is to establish whether the Internet in Russia can fulfill the function of ensuring the flow of information necessary for successful dissident activity. Accordingly, we seek to answer the following research question: Does the Internet provide an effective tool for politically-interested people in Russia to conduct dissident activities under the authoritarian regime?

Besides showing the Internet’s leading role in organizing modern protests, our research also prove that in the information environment where practically all traditional mass-media are under the authorities’ control, the Internet becomes the only powerful and effective source of alternative information about the real situation on the repressed territory.

About the Harriman Institute: Founded in 1946, the Harriman Institute housed at Columbia University is the oldest academic institution in the United States devoted to the study of the countries of the former Soviet Union, East Central Europe and the Balkans. (For more details: http://www.harrimaninstitute.org/)

About Columbia University: Columbia University, a member of the Ivy League, was founded in 1754. It is the oldest institution of higher learning in the state of New York and the fifth oldest in the United States. (For more details: http://www.columbia.edu)

Shh! It’s Vive La Résistance…A Case Study on Underground Resistance and Change Management

Nicholas D. Sweers II and I have authored a case study on the complexities of change management when underground resistance is present. The case study will appear in the Journal of Business Strategy.

This case study highlights the challenge of dealing with underground resistance when leading organizational change. Underground resistance has deterred many change management efforts. Moreover, strategies to address underground resistance are still at a nascent stage of development in management practice and literature. The case tells the story of Sam Bridgeport, a Senior Partner at a major consulting firm in Seattle, who has been charged with leading a restructuring effort that will significantly affect the everyday operations of the organization. Unlike past change management initiatives, which often failed, Sam was wise to encourage employee participation from the start. As a result, Sam was able to mitigate most of the opposition against his plan, but he soon finds out that he gravely underestimated the natural human tendency to resist change. Sam discovers a covert, underground resistance effort is quickly gaining steam, and he must put a stop to it before it’s too late.

Executive responses to the case study from Mark R. Jones, CEO, The Sunyata Group and George Head, Senior Vice President Broadband Services for Stratos Global will also be published.

Dismantling Terrorist Networks to appear in Technology Forecasting and Social Change

Jared Keller, Yuan Lin, and I authored a paper that describes how agent-based modeling can be used to consider policy options for dismantling terrorist networks. The paper will appear in Technology Forecasting and Social Change.

Dismantling Terrorist Networks: Evaluating Strategic Options Using Agent-Based Modeling

Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security studies domains.

Business Process Outsourcing: A Case Study of Satyam Computers

I have a new paper accepted for publication in the International Journal of Information Management.

Abstract: The prominence of business process outsourcing (BPO) continues to intensify in today’s hyper-competitive marketplace. Engaging in BPO can help an organization focus on its core competencies, while gaining specialized knowledge, skills, and processes in auxiliary spaces. The literature is laden with evidence that engaging in a BPO will help organizations secure financial, operational, and even strategic advantages. While there is little doubt that organizations can attain these benefits, few BPO arrangements work out as planned. Managing risks in BPO arrangements is paramount. In this case analysis, we describe a significant failure through chronological description of scandals that took place at one of India’s largest outsourcing vendors, Satyam Computer Services. In describing the study, we draw attention to the fact that organizations need to (1) improve their sensing capabilities and keep abreast of strategic transformations at their outsourcing vendors, (2) be able to plan for and execute contingency plans, and (3) balance the risks and rewards of BPOs in terms of knowledge and capabilities dependencies.

Bhagwatwar, A., Atesci, K., Deo, T., Desouza, K.C., and Baloh, P. “Business Process Outsourcing: A Case Study of Satyam Computers,”International Journal of Information Management, Forthcoming.

Article on Information and Knowledge Management in the Case of the US Intelligence Community featured on Harvard Business Review Blog

Thomas H. Davenport wrote a nice post on the Harvard Business Review blog on why the US Intel. Community failed to stop the Christmas Day Bomber from boarding a flight to the US. Tom highlights my paper published in the International Journal of Public Administration that examined information and knowledge management in the US Intel Community.

To access Tom’s Harvard Business Review blog, please click here [LINK]

To access my paper, Information and Knowledge Management in Public Sector Networks: The Case of the US Intelligence Community, International Journal of Public Administration, 32 (14), 2009, 1219–1267, please click here [LINK]

To read a short blurb on the University of Washington Information School website, please click here [LINK]

Information Management and Environmental Sustainability: New Article in Business Information Review

Peter C. Ellis and I have a paper published in the current issue of Business Information Review.

Abstract: Attempting to merge the topics of environmental sustainability and information management, this article works towards defining both fields and constructing a viable framework that creates a strong relationship between the two topics. Reviewing literature on information management and environmental sustainability, the authors argue that the two topics must become inseparable — the work in one discipline must inform and advance the other. The need to do so is further underscored by the evolving nature of both disciplines.

To access the article, please click here [LINK]

Reference: Ellis, P.C., and Desouza, K.C. “On Information Management, Environmental Sustainability, and Cradle to Cradle Mentalities: A Relationship Framework,” Business Information Review, 26 (4), 2009, 257-264.