1273 lines
66 KiB
Plaintext
1273 lines
66 KiB
Plaintext
Organizational Analysis in Computer Science
|
|
|
|
Rob Kling
|
|
Department of Information & Computer Science
|
|
and
|
|
Center for Research on Infromation Technology and Organizations
|
|
University of California at Irvine,
|
|
Irvine, CA 92717, USA
|
|
kling@ics.uci.edu (714-856-5955)
|
|
|
|
June 1993 (v. 13.2)
|
|
|
|
|
|
Apears in The Information Society, 9(2) (Mar-Jun, 1993):71-87.
|
|
|
|
|
|
ABSTRACT
|
|
|
|
Computer Science is hard pressed in the US to show broad utility
|
|
to help justify billion dollar research programs and the value of
|
|
educating well over 40,000 Bachelor of Science and Master of
|
|
Science specialists annually in the U.S. The Computer Science and
|
|
Telecommunications Board of the U.S. National Research Council
|
|
has recently issued a report, "Computing the Future (Hartmanis
|
|
and Lin, 1992)" which sets a new agenda for Computer Science. The
|
|
report recommends that Computer Scientists broaden their
|
|
conceptions of the discipline to include computing applications
|
|
and domains to help understand them. This short paper argues that
|
|
many Computer Science graduates need some skills in analyzing
|
|
human organizations to help develop appropriate systems
|
|
requirements since they are trying to develop high performance
|
|
computing applications that effectively support higher
|
|
performance human organizations. It is time for academic Computer
|
|
Science to embrace organizational analysis (the field of
|
|
Organizational Informatics) as a key area of research and
|
|
instruction.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
INTRODUCTION
|
|
|
|
Computer Science is being pressed on two sides to show broad
|
|
utility for substantial research and educational support. For
|
|
example, the High Performance Computing Act will provide almost
|
|
two billion dollars for research and advanced development. Its
|
|
advocates justified it with arguments that specific technologies,
|
|
such as parallel computing and wideband nets, are necessary for
|
|
social and economic development. In the US, Computer Science
|
|
academic programs award well over 30,000 Bachelor of Science (BS)
|
|
and almost 10,000 Master of Science (MS) degrees annually. Some
|
|
of these students enter PhD programs and many work on projects
|
|
which emphasize mathematical Computer Science. But many of these
|
|
graduates also take computing jobs for which they are
|
|
inadequately educated, such as helping to develop high
|
|
performance computing applications to improve the performance of
|
|
human organizations.
|
|
|
|
These dual pressures challenge leading Computer Scientists to
|
|
broaden their conceptions of the discipline to include an
|
|
understanding of key application domains, including computational
|
|
science and commercial information systems. An important report
|
|
that develops this line of analysis, "Computing the Future" (CTF)
|
|
(Hartmanis and Lin, 1992), was recently issued by the Computer
|
|
Science and Telecommunications Board of the U.S. National
|
|
Research Council.
|
|
|
|
CTF is a welcome report that argues that academic Computer
|
|
Scientists must acknowledge the driving forces behind the
|
|
substantial Federal research support for the discipline. The
|
|
explosive growth of computing and demand for CS in the last
|
|
decade has been driven by a diverse array of applications and new
|
|
modes of computing in diverse social settings. CTF takes a
|
|
strong and useful position in encouraging all Computer Scientists
|
|
to broaden our conceptions of the discipline and to examine
|
|
computing in the context of interesting applications.
|
|
|
|
CTF's authors encourage Computer Scientists to envision new
|
|
technologies in the social contexts in which they will be used.
|
|
They identify numerous examples of computer applications in earth
|
|
science, computational biology, medical care, electronic
|
|
libraries and commercial computing that can provide significant
|
|
value to people and their organizations. These assessments rest
|
|
on concise and tacit analyses of the likely design,
|
|
implementation within organizations, and uses of these
|
|
technologies. For example, CTF's stories of improved
|
|
computational support for modelling are based on rational models
|
|
of organizational behavior. They assume that professionals,
|
|
scientists, and policy-makers use models to help improve their
|
|
decisions. But what if organizations behave differently when they
|
|
use models? For example suppose policy makers use models to help
|
|
rationalize and legitimize decisions which are made without
|
|
actual reference to the models?
|
|
|
|
One cannot discriminate between these divergent roles of
|
|
modelling in human organizations based upon the intentions of
|
|
researchers and system designers. The report tacitly requires
|
|
that the CS community develop reliable knowledge, based on
|
|
systematic research, to support effective analysis of the likely
|
|
designs and uses of computerized systems. CTF tacitly requires an
|
|
ability to teach such skills to CS practitioners and students.
|
|
Without a disciplined skill in analyzing human organizations,
|
|
Computer Scientists' claims about the usability and social value
|
|
of specific technologies is mere opinion, and bears a significant
|
|
risk of being misleading. Further, Computer Scientists who do not
|
|
have refined social analytical skills sometimes conceive and
|
|
promote technologies that are far less useful or more costly than
|
|
they claim. Effective CS practitioners who "compute for the
|
|
future" in organizations need some refined skills in
|
|
organizational analysis to understand appropriate systems
|
|
requirements and the conditions that transform high performance
|
|
computing into high performance human organizations. Since CTF
|
|
does not spell out these tacit implications, I'd like to explain
|
|
them here.
|
|
|
|
BROADENING COMPUTER SCIENCE:
|
|
FROM COMPUTABILITY TO USABILITY
|
|
|
|
The usability of systems and software is a key theme in the
|
|
history of CS. We must develop theoretical foundations for the
|
|
discipline that give the deepest insights in to what makes
|
|
systems usable for various people, groups and organizations.
|
|
Traditional computer scientists commonly refer to mathematics as
|
|
the theoretical foundations of CS. However, mathematical
|
|
formulations give us limited insights into understanding why and
|
|
when some computer systems are more usable than others.
|
|
|
|
Certain applications, such as supercomputing and computational
|
|
science are evolutionary extensions of traditional scientific
|
|
computation, despite their new direction with rich graphical
|
|
front ends for visualizing enormous mounds of data. But other,
|
|
newer modes of computing, such as networking and microcomputing,
|
|
change the distribution of applications. While they support
|
|
traditional numerical computation, albeit in newer formats such
|
|
as spreadsheets, they have also expanded the diversity of
|
|
non-numerical computations. They make digitally represented text
|
|
and graphics accessible to tens of millions of people.
|
|
|
|
These technological advances are not inconsistent with
|
|
mathematical foundations in CS, such as Turing machine
|
|
formulations. But the value of these formats for computation is
|
|
not well conceptualized by the foundational mathematical models
|
|
of computation. For example, text editing could be conceptualized
|
|
as a mathematical function that transforms an initial text and a
|
|
vector of incremental alterations into a revised text. Text
|
|
formatting can be conceptualized as a complex function mapping
|
|
text strings into spatial arrays. These kinds of formulations
|
|
don't help us grasp why many people find "what you see is what
|
|
you get" editors as much more intuitively appealing than a system
|
|
that links line editors, command-driven formatting languages, and
|
|
text compilers in series.
|
|
|
|
Nor do our foundational mathematical models provide useful ways
|
|
of conceptualizing some key advances in even more traditional
|
|
elements of computer systems such as operating systems and
|
|
database systems. For example, certain mathematical models
|
|
underlie the major families of database systems. But one can't
|
|
rely on mathematics alone to assess how well networks, relations,
|
|
or object-entities serve as representations for the data stored
|
|
in an airline reservation system. While mathematical analysis can
|
|
help optimize the efficiency of disk space in storing the data,
|
|
they can't do much to help airlines understand the kinds of
|
|
services that will make such systems most useful for
|
|
reservationists, travel agents and even individual travellers. An
|
|
airline reservation system in use is not simply a closed
|
|
technical system. It is an open socio-technical system (Hewitt,
|
|
1986; Kling, 1992). Mathematical analysis can play a central role
|
|
in some areas of CS, and an important role in many areas. But we
|
|
cannot understand important aspects of usability if we limit
|
|
ourselves to mathematical theories.
|
|
|
|
The growing emphasis of usability is one of the most dominant of
|
|
the diverse trends in computing. The usability tradition has deep
|
|
roots in CS, and has influenced the design of programming
|
|
languages and operating systems for over 25 years. Specific
|
|
topics in each of these areas also rest on mathematical analysis
|
|
which Computer Scientists could point to as "the foundations" of
|
|
the respective subdisciplines. But Computer Scientists envision
|
|
many key advances as design conceptions rather than as
|
|
mathematical theories. For example, integrated programming
|
|
environments ease software development. But their conception and
|
|
popularity is not been based on deeper formal foundations for
|
|
programming languages. However, the growth of non-numerical
|
|
applications for diverse professionals, including text
|
|
processing, electronic mail, graphics, and multimedia should
|
|
place a premium on making computer systems relatively simple to
|
|
use. Human Computer Interaction (HCI) is now considered a core
|
|
subdiscipline of CS.
|
|
|
|
The integration of HCI into the core of CS requires us to expand
|
|
our conception of the theoretical foundations of the discipline.
|
|
While every computational interface is reducible to a Turing
|
|
computation, the foundational mathematical models of CS do not
|
|
(and could not) provide a sound theoretical basis for
|
|
understanding why some interfaces are more effective for some
|
|
groups of people than others. The theoretical foundations of
|
|
effective computer interfaces must rest on sound theories of
|
|
human behavior and their empirical manifestations (cf. Ehn, 1991,
|
|
Grudin, 1989).
|
|
|
|
Interfaces also involve capabilities beyond the primary
|
|
information processing features of a technology. They entail ways
|
|
in which people learn about systems and ways to manage the
|
|
diverse data sets that routinely arise in using many computerized
|
|
systems (Kling, 1992). Understanding the diversity and character
|
|
of these interfaces, that are required to make many systems
|
|
usable, rests in an understanding the way that people and groups
|
|
organize their work and expertise with computing. Appropriate
|
|
theories of the diverse interfaces that render many computer
|
|
systems truly useful must rest, in part, on theories of work and
|
|
organization. There is a growing realization, as networks tie
|
|
users together at a rapidly rising rate, that usability cannot
|
|
generally be determined without our considering how computer
|
|
systems are shaped by and also alter interdependencies in groups
|
|
and organizations. The newly-formed subdiscipline of Computer
|
|
Supported Cooperative Work and newly-coined terms "groupware" and
|
|
"coordination theory" are responses to this realization (Greif,
|
|
1988; Galegher, Kraut and Egido, 1990).
|
|
|
|
|
|
BROADENING COMPUTER SCIENCE:
|
|
FROM HIGH PERFORMANCE COMPUTING
|
|
TO HIGH PERFORMANCE ORGANIZATIONS
|
|
|
|
The arguments of CTF go beyond a focus on usable interface
|
|
designs to claims that computerized systems will improve the
|
|
performance of organizations. The report argues that the US
|
|
should invest close to a billion dollars a year in CS research
|
|
because of the resulting economic and social gains. These are
|
|
important claims, to which critics can seek systematic evidence.
|
|
For example, one can investigate the claim that 20 years of major
|
|
computing R&D and corporate investment in the US has helped
|
|
provide proportionate economic and social value.
|
|
|
|
CTF is filled with numerous examples where computer-based systems
|
|
provided value to people and organizations. The tough question is
|
|
whether the overall productive value of these investments is
|
|
worth the overall acquisition and operation costs. While it is
|
|
conventional wisdom that computerization must improve
|
|
productivity, a few researchers began to see systemic
|
|
possibilities of counter-productive computerization in the early
|
|
1980s (King and Kraemer, 1981). In the last few years economists
|
|
have found it hard to give unambiguously affirmative answers to
|
|
this question. The issue has been termed "The Productivity
|
|
Paradox," based on a comment attributed to Nobel laureate Robert
|
|
Solow who remarked that "computers are showing up everywhere
|
|
except in the [productivity] statistics (Dunlop and Kling,
|
|
1991a)."
|
|
|
|
Economists are still studying the conditions under which
|
|
computerization contributes to organizational productivity, and
|
|
how to measure it [1]. But even if computerization proves to be a
|
|
productive investment, in the net, in most economic sectors,
|
|
there is good reason to believe that many organizations get much
|
|
less value from their computing investments than they could and
|
|
should.
|
|
|
|
There is no automatic link between computerization and improved
|
|
productivity. While many computer systems have been usable and
|
|
useful, productivity gains require that their value exceed all of
|
|
their costs.
|
|
|
|
There are numerous potential slips in translating high
|
|
performance computing into cost-effective improvements in
|
|
organizational performance. Some technologies are superb for
|
|
well-trained experts, but are difficult for less experienced
|
|
people or "casual users." Many technologies, such as networks and
|
|
mail systems, often require extensive technical support, thus
|
|
adding hidden costs (Kling, 1992).
|
|
|
|
Further, a significant body of empirical research shows that the
|
|
social processes by which computer systems are introduced and
|
|
organized makes a substantial difference in their value to
|
|
people, groups and organizations (Lucas, 1981; Kraemer, et. al.
|
|
1985; Orlikowski, 1992). Most seriously, not all presumably
|
|
appropriate computer applications fit a person or group's work
|
|
practices. While they may make sense in a simplified world, they
|
|
can actually complicate or misdirect real work.
|
|
|
|
Group calendars are but one example of systems that can sound
|
|
useful, but are often useless because they impose burdensome
|
|
record keeping demands (Grudin, 1989). In contrast, electronic
|
|
mail is one of the most popular applications in office support
|
|
systems, even when other capabilities, like group calendars, are
|
|
ignored (Bullen and Bennett, 1991). However, senders are most
|
|
likely to share information with others when the system helps
|
|
provide social feedback about the value of their efforts or they
|
|
have special incentives (Sproull and Kiesler, 1991; Orlikowski,
|
|
1992). Careful attention to the social arrangements or work can
|
|
help Computer Scientists improve some systems designs, or also
|
|
appreciate which applications may not be effective unless work
|
|
arrangements are changed when the system is introduced.
|
|
|
|
The uses and social value of most computerized systems can not be
|
|
effectively ascertained from precise statements of their basic
|
|
design principles and social purposes. They must be analyzed
|
|
within the social contexts in which they will be used. Effective
|
|
social analyses go beyond accounting for formal tasks and
|
|
purposes to include informal social behavior, available
|
|
resources, and the interdependencies between key groups
|
|
(Cotterman and Senn, 1992).
|
|
|
|
Many of the BS and MS graduates of CS departments find employment
|
|
on projects where improved computing should enhance the
|
|
performance of specific organizations or industries.
|
|
Unfortunately, few of these CS graduates have developed an
|
|
adequate conceptual basis for understanding when information
|
|
systems will actually improve organizational performance.
|
|
Consequently, many of them are prone to recommend systems-based
|
|
solutions whose structure or implementation within organizations
|
|
would be problematic.
|
|
|
|
ORGANIZATIONAL INFORMATICS
|
|
|
|
Organizational Informatics denotes a field which studies the
|
|
development and use of computerized information systems and
|
|
communication systems in organizations. It includes studies of
|
|
their conception, design, effective implementation within
|
|
organizations, maintenance, use, organizational value, conditions
|
|
that foster risks of failures, and their effects for people and
|
|
an organization's clients. It is an intellectually rich and
|
|
practical research area.
|
|
|
|
Organizational Informatics is a relatively new label. In Europe,
|
|
the term Informatics is the name of many academic departments
|
|
which combine both CS and Information Systems. In North America,
|
|
Business Schools are the primary institutional home of
|
|
Information Systems research and teaching. But this location is a
|
|
mixed blessing. It brings IS research closer to organizational
|
|
studies. But the institutional imperatives of business schools
|
|
lead IS researchers to emphasize the development and use of
|
|
systems in a narrow range of organizations -- businesses
|
|
generally, and often service industry firms. It excludes
|
|
information systems in important social sectors such as health
|
|
care, military operations, air-traffic control, libraries, home
|
|
uses, and so on. And Information Systems research tries to avoid
|
|
messy issues which many practicing Computer Scientists encounter:
|
|
developing requirements for effective systems and mitigating the
|
|
major risks to people and organizations who depend upon them.
|
|
|
|
The emerging field of Organizational Informatics builds upon
|
|
research conducted under rubrics like Information Systems and
|
|
Information Engineering. But it is more wide ranging than either
|
|
of these fields are in practice[2].
|
|
|
|
Organizational Informatics Research
|
|
|
|
In the last 20 years a loosely organized community of some dozens
|
|
of researchers have produced a notable body of systematic
|
|
scientific research in Organizational Informatics. These studies
|
|
examine a variety of topics, including:
|
|
* how system designers translate people's preferences
|
|
into requirements;
|
|
* the functioning of software development teams in
|
|
practice;
|
|
* the conditions that foster and impede the
|
|
implementation of computerized systems within
|
|
organizations;
|
|
* the ways that computerized systems simplify or
|
|
complicate coordination within and between
|
|
organizations;
|
|
* how people and organizations use systems in practice;
|
|
* the roles of computerized systems in altering work,
|
|
group communication, power relationships, and
|
|
organizational practices.
|
|
Researchers have extensively studied some of these topics, such
|
|
as computerization and changing work, appear in synoptic review
|
|
articles (Kling and Dunlop, in press). In contrast, researchers
|
|
have recently begun to examine other topics, such software design
|
|
(Winograd and Flores, 1986; Kyng and Greenbaum, 1991), and have
|
|
recently begun to use careful empirical methods (e.g. Suchman,
|
|
1983; Bentley, et. al, 1992; Fish, et. al., 1993). I cannot
|
|
summarize the key theories and rich findings of these diverse
|
|
topics in a few paragraphs. But I would like to comment upon a
|
|
few key aspects of this body of research.
|
|
|
|
Computer Systems Use in Social Worlds
|
|
|
|
Many studies contrast actual patterns of systems design,
|
|
implementation, use or impacts with predictions made by Computer
|
|
Scientists and professional commentators. A remarkable fraction
|
|
of these accounts are infused with a hyper-rational and under-
|
|
socialized view of people, computer systems, organizations and
|
|
social life in general. Computer Scientists found that rule
|
|
driven conceptions to be powerful ways to abstract domains like
|
|
compilers. But many Computer Scientists extend them to be a
|
|
tacit organizing frame for understanding whole computer systems,
|
|
their developers, their users and others who live and work with
|
|
them. Organizations are portrayed as generally cooperative
|
|
systems with relatively simple and clear goals. Computer systems
|
|
are portrayed as generally coherent and adequate for the tasks
|
|
for which people use them. People are portrayed as generally
|
|
obedient and cooperative participants in a highly structured
|
|
system with numerous tacit rules to be obeyed, such as doing
|
|
their jobs as they are formally described. Using data that is
|
|
contained in computer systems, and treating it as information or
|
|
knowledge, is a key element of these accounts. Further, computer
|
|
systems are portrayed as powerful, and often central, agents of
|
|
organizational change.
|
|
|
|
This Systems Rationalist perspective infuses many accounts of
|
|
computer systems design, development, and use in diverse
|
|
application domains, including CASE tools, instructional
|
|
computing, models in support of public policy assessments, expert
|
|
systems, groupware, supercomputing, and network communications
|
|
(Kling, 1980; Kling, Scherson and Allen, 1992).
|
|
|
|
All conceptual perspectives are limited and distort "reality."
|
|
When Organizational Informatics researchers systematically
|
|
examine the design practices in particular organizations, how
|
|
specific groups develop computer systems, or how various people
|
|
and groups use computerized systems, they find an enormous range
|
|
of fascinating and important human behavior which lies outside
|
|
the predictive frame of Systems Rationalism. Sometimes these
|
|
behaviors are relatively minor in overall importance. But in many
|
|
cases they are so significant as to lead Organizational
|
|
Informatics researchers to radically reconceptualize the
|
|
processes which shape and are shaped by computerization.
|
|
|
|
There are several alternative frames for reconceptualizing
|
|
computerization as alternatives to Systems Rationalism. The
|
|
alternatives reflect, in part, the paradigmatic diversity of the
|
|
social sciences. But all of these reconceptions situate computer
|
|
systems and organizations in richer social contexts and with more
|
|
complex and multivalent social relations than does systems
|
|
rationalism. Two different kinds of observations help anchor
|
|
these abstractions.
|
|
|
|
Those who wish to understand the dynamics of model usage in
|
|
public agencies must appreciate the institutional relationships
|
|
which influence the organization's behavior. For example, to
|
|
understand economic forecasting by the US Congress and the U.S.
|
|
Executive branch's Office of Management and Budget, one must
|
|
appreciate the institutional relations between them. They are not
|
|
well described by Systems Rationalist conceptions because they
|
|
were designed to continually differ with each other in their
|
|
perspectives and preferred policies. That is one meaning of
|
|
"checks and balances" in the fundamental design of the US Federal
|
|
Government. My colleagues, Ken Kraemer and John King, titled
|
|
their book about Federal economic modelling, DataWars (Kraemer,
|
|
et. al., 1985). Even this title doesn't make much sense within a
|
|
Systems Rationalist framework.
|
|
|
|
Modelling can be a form of intellectual exploration. It can also
|
|
be a medium of communication, negotiation, and persuasion. The
|
|
social relationships between modelers, people who use them and
|
|
diverse actors in Federal policymaking made these socially
|
|
mediated roles of models sometimes most important. In these
|
|
situations, an alternative view of organizations as coalitions of
|
|
interest groups was a more appropriate conceptualization. And
|
|
within this coalitional view of organizations, a conception of
|
|
econometric models as persuasion support systems rather than as
|
|
decision support systems sometimes is most appropriate.
|
|
Organizational Informatics researchers found that political views
|
|
of organizations and systems developments within them apply to
|
|
many private organizations as well as to explicitly political
|
|
public agencies.
|
|
|
|
Another major idea to emerge from the broad body of
|
|
Organizational Informatics research is that the social patterns
|
|
which characterize the design, development, uses and consequences
|
|
of computerized systems are dependent on the particular ecology
|
|
of social relationships between participants. This idea may be
|
|
summarized by saying that the processes and consequences of
|
|
computerization are "context dependent." In practice, this means
|
|
that the analyst must be careful in generalizing from one
|
|
organizational setting to another. While data wars might
|
|
characterize econometric modelling on Capitol Hill, we do not
|
|
conclude that all computer modelling should be interpreted as
|
|
persuasion support systems. In some settings, models are used to
|
|
explore the effects of policy alternatives without immediate
|
|
regard for their support as media for communication, negotiation
|
|
or persuasion. At other times, the same model might be used (or
|
|
abused with cooked data) as a medium of persuasion. The brief
|
|
accounts of models for global warming in CTF fit a Systems
|
|
Rationalist account. Their uses might appear much less
|
|
"scientific" if they were studied within the actual policy
|
|
processes within which they are typically used.
|
|
|
|
Computing in a Web of Technological and Social Dependencies:
|
|
The Role of Infrastructure
|
|
|
|
Another key feature of computerized systems is the technological
|
|
and organizational infrastructure required to support their
|
|
effective use (Kling and Scacchi, 1982; Kling, 1987; Kling,
|
|
1992). The information processing models of computerized systems
|
|
focus on the "surface structures," such as information flows
|
|
within a system. For example, one can compare the information
|
|
processing capabilities of computerized modelling systems in
|
|
terms of the complexity and variety of computations that they
|
|
support, the richness of their graphical displays, and so on.
|
|
Text processing systems can be similarly compared by contrasting
|
|
their capabilities for handling footnotes, graphics, fine grained
|
|
text placement, custom dictionaries and so on. From an
|
|
information processing point of view, system A is usually better
|
|
than system B if it offers many more capabilities than system B.
|
|
Information processing conceptions have also fueled much of the
|
|
talk about high performance computing. It is common to talk about
|
|
massively parallel computing in terms of the scale and unit cost
|
|
of computation (Kling, Scherson, and Allen 1992), and the
|
|
discussions of networking in terms of the wide data bandwidths
|
|
that new technologies offer.
|
|
|
|
If we ask how these technologies improve organizational
|
|
performance, then we have to ask how they can be made usable to
|
|
diverse groups. The most powerful modelling system may be of
|
|
limited utility if it requires sophisticated programming skills
|
|
to create and modify every data transformation. Alternatively,
|
|
such a package can be made more widely useful by having the
|
|
modelling efforts managed by a programming group whihc provides
|
|
added value for added cost.
|
|
|
|
Few people are capable or interested in primarily using "raw
|
|
computing" for their work. The diverse array of "productivity
|
|
software" -- such as text processing, presentation graphics,
|
|
spreadsheets, databases and so on gain their value when they can
|
|
be provided and maintained in a way that matches the skills and
|
|
available time of people who will use them. Both skill and time
|
|
are scarce resources in most organizations. Skilled time is
|
|
especially expensive.
|
|
|
|
Similarly, the organizational value of digital libraries can't be
|
|
adequately conceptualized in terms of simple data-centric
|
|
measures, like the number of gigabytes of available files. The
|
|
ease of people accessing useful documents is much more pertinent,
|
|
although much less frequently discussed today.
|
|
|
|
In each of these cases, the support systems for the focal
|
|
computing system is integral to the effective operation of the
|
|
technology. Infrastructure refers to the set of human and
|
|
organizational resources that help make it simpler and faster for
|
|
skilled people to use computerized systems. Infrastructure should
|
|
be part of the conceptualization. Often the support systems for a
|
|
computing can involve several different organizations, including
|
|
hardware and software vendors, telecommunication support groups,
|
|
divisional systems groups, and local experts (Kling, 1992). It
|
|
can be organizationally very complex and unresponsive in some
|
|
cases and organizationally simpler and more effective in others.
|
|
In any case, the infrastructure for systems support can't be
|
|
ignored when one is interested in improving organizational
|
|
performance.
|
|
|
|
Repercussions for Systems Design
|
|
|
|
Even when computerized systems are used as media of intellectual
|
|
exploration, Organizational Informatics researchers find that
|
|
social relationships influence the ways that people use
|
|
computerized systems. Christine Bullen and John Bennett (1991)
|
|
studied 25 organizations that used groupware with diverse
|
|
modeules such as databases, group calendars, text annotating
|
|
facilities and electronic mail. They found that the electronic
|
|
mail modules were almost universally valued, while other system
|
|
facilities were often unused.
|
|
|
|
In a recent study, Sharyn Ladner and Hope Tillman examined the
|
|
use of the Internet by university and corporate librarians. While
|
|
many of them found data access through databases and file
|
|
transfer to be important services, they also reported that
|
|
electronic mail was perhaps the most critical Internet feature
|
|
for them.
|
|
The participants in our study tell us something that we
|
|
may have forgotten in our infatuation with the new
|
|
forms of information made available through the
|
|
Internet. And that is their need for community. To be
|
|
sure, our respondents use the Internet to obtain
|
|
information not available in any other format, to
|
|
access databases ... that provide new efficiencies in
|
|
their work, new ways of working. But their primary use
|
|
is for communication. Special librarians tend to be
|
|
isolated in the workplace -- the only one in their
|
|
subject specialty (in the case of academe), or the only
|
|
librarian in their organization (in the case of a
|
|
corporate library). Time and time again our
|
|
respondents expressed this need to talk to someone --
|
|
to learn what is going on in their profession, to
|
|
bounce ideas off others, to obtain information from
|
|
people, not machines.
|
|
There are tremendous implications from the Internet
|
|
technology in community formation -- the Internet may
|
|
indeed provide a way to increase community among
|
|
scholars, including librarians. The danger we face at
|
|
this juncture in time, as we attach library resources
|
|
to the Internet, is to focus all of our energies on the
|
|
machine-based resources at the expense of our human-
|
|
based resources, i.e., ourselves (Ladner and Tillman,
|
|
1992).
|
|
In these studies, Organizational Informatics researchers have
|
|
developed a socially rich view of work with and around computing,
|
|
of computing within a social world.
|
|
|
|
These studies have strong repercussions for the design of
|
|
software. A good designer cannot assume that the majority of
|
|
effort should go into the "computational centerpiece" of a
|
|
system, while devoting minor efforts to supporting communication
|
|
facilities. One of my colleagues designed a modelling system for
|
|
managers in a major telephone company, after completing an
|
|
extensive requirements analysis. However, as an afterthought, he
|
|
added a simple mail system in a few days work. He was surprised
|
|
to find that the people who used these systems regularly used his
|
|
crude electronic mail system, while they often ignored
|
|
interesting modelling capabilities. Such balances of attention
|
|
also have significant repercussions. Many people need good mail
|
|
systems, not just crude ones: systems which include facile
|
|
editors, ease in exporting and importing files, and effective
|
|
mail management (Kling and Covi, 1993).
|
|
|
|
Assessing people's preferences for systems' designs is an
|
|
exercise in social inquiry. While rapid prototyping may help
|
|
improve designs for some systems, it is less readily applicable
|
|
to systems which are used by diverse groups at numerous
|
|
locations. Computer scientists are beginning to develop more
|
|
reliable methods of social inquiry to better understand which
|
|
systems designs will be most useful (Bentley, et. al. 1992; Kyng
|
|
and Greenbaum, 1991). It is particularly helpful to organize
|
|
system designs that help minimize the complexity and cost of its
|
|
infrastructure (Kling, 1992).
|
|
|
|
Fish and his colleagues (1993) recently reported the way that the
|
|
explicit use of social theory helped them design more effective
|
|
group meeting systems. Unfortunately, these newer methods are
|
|
rarely taught to CS students. When computer specialists build an
|
|
imbalanced system, it should not be a surprise when the
|
|
resulting organizational value of their efforts is very
|
|
suboptimal.
|
|
|
|
|
|
System Security and Reliability
|
|
|
|
In a simplified engineering model of computing, the reliability
|
|
of products is assured through extensive testing in a development
|
|
lab. The social world of technology use not perceived as shaping
|
|
the reliability of systems, except through irascible human
|
|
factors, such as "operator errors." An interesting and tragic
|
|
illustration of the limitations of this view can be found in some
|
|
recent studies of the causes of death and maiming by an electron
|
|
accelerator which was designed to help cure cancer, the Therac-25
|
|
(Jacky, 1991, Leveson and Turner, 1993).
|
|
|
|
The Therac-25 was designed and marketed in the mid 1980s by a
|
|
Canadian firm, Atomic Energy of Canada Limited (AECL), as an
|
|
advanced medical technology. It featured complete software
|
|
control over all major functions (supported by a DEC PDP-11),
|
|
among other innovations. Previous machines included electro-
|
|
mechanical interlocks to raise and lower radiation shields.
|
|
Several thousand people were effectively treated with the Therac-
|
|
25 each year. However, between 1985 and 1987 there were six known
|
|
accidents in which several people died in the US. Other were
|
|
seriously maimed or injured [3].
|
|
|
|
Both studies concur that there were subtle but important flaws in
|
|
the design of the Therac-25's software and hardware. AECL's
|
|
engineers tried to patch the existing hardware and (finally)
|
|
software when they learned of some of the mishaps. But they
|
|
treated each fix as the final repair.
|
|
|
|
Both studies show how the continuing series of mishaps was
|
|
exacerbated by diverse organizational arrangements. Jacky claims
|
|
that pressures for speedy work by radiological technicians
|
|
coupled with an interface design that did not enhance important
|
|
error messages was one of many causes of the accidents. Leveson
|
|
and Turner differ in downplaying the working conditions of the
|
|
Therac-25's operators and emphasize the flawed social system for
|
|
communicating the seriousness of problems to Federal regulators
|
|
and other hospitals. Both studies observe that it is unlikely for
|
|
the best of companies to develop perfect error-free systems
|
|
without high quality feedback from users. Their recommendations
|
|
differ: Jacky discusses the licensing of system developers and
|
|
the regulation of computerized medical systems to improve minimal
|
|
standards of saftey. Leveson and Turner propose extensive
|
|
education and training of software engineers and more effective
|
|
communication between manufacturers and their customers.
|
|
|
|
However, both studies indicate that an understanding of the
|
|
safety of computer systems must go beyond the laboratory and
|
|
extend into the organizational settings where it is used. In the
|
|
case of the Therac-25, it required understanding a complex web of
|
|
interorganizational relationships, as well as the technical
|
|
design and operation of the equipment. Nancy Leveson (1992)
|
|
points out that most major disasters technological disasters in
|
|
the last 20 years "involved serious organizational and management
|
|
deficiencies." Hughes, Randall and Shapiro (1992:119) observe
|
|
that British no civil collision in UK air space has been
|
|
attributed to air traffic control failures. But their Mediator
|
|
control system was failing regularly and had no backup during the
|
|
period that they studied it. They observe that the reliability of
|
|
the British air traffic control system resides in totality of the
|
|
relevant social and technical systems, rather than in a single
|
|
component.
|
|
|
|
The need for this kind of organizational understanding is
|
|
unfortunately slighted in the CS academic world today. CTF
|
|
discusses only those aspects of computer system reliability which
|
|
are amenable to understanding through laboratory-like studies
|
|
(Hartmanis and Lin, 1992:110-111). But cases of safety critical
|
|
systems, like the Therac-25 and British Air Traffic Control,
|
|
indicate why some Computer Scientists must be willing to
|
|
undertake (and teach) organizational analysis.
|
|
|
|
|
|
Worldviews and Surprises about Computerization
|
|
|
|
These few paragraphs barely sketch the highlights of a fertile
|
|
and significant body of research about computer systems in use.
|
|
Perhaps the most important simplification for traditional
|
|
computer scientists is to appreciate how people and their
|
|
organizations are situated in a social world and consequently
|
|
compute within a social world. People act in relationship to
|
|
others in various ways and concerns of belonging, status,
|
|
resources, and power are often central. The web of people's
|
|
relationships extend beyond various formally defined group and
|
|
organizational boundaries (Kling and Scacchi, 1982; Kling, 1987;
|
|
Kling, 1992). People construct their worlds, including the
|
|
meanings and uses of information technologies, through their
|
|
social interactions.
|
|
|
|
This view is, of course, not new to social scientists. On the
|
|
other hand, there is no specific body of social theory which can
|
|
easily be specialized for "the case of computing," and swiftly
|
|
produce good theories for Organizational Informatics as trivial
|
|
deductions. The best research in Organizational Informatics draws
|
|
upon diverse theoretical and methodological approaches within the
|
|
social sciences with a strong effort to select those which best
|
|
explain diverse aspects of computerization.
|
|
|
|
ORGANIZATIONAL INFORMATICS WITHIN COMPUTER SCIENCE
|
|
|
|
CTF places dual responsibilities on Computer Scientists. One
|
|
responsibility is to produce a significant body of applicable
|
|
research. The other responsibility is to educate a significant
|
|
fraction of CS students to be more effective in conceiving and
|
|
implementing systems that will enhance organizational
|
|
performance. It may be possible to organize research and
|
|
instruction so as to decouple these responsibilities. For
|
|
example, molecular biologists play only a small role in training
|
|
doctors. However, CS departments act like an integrated Medical
|
|
school and Biology department. They are the primary academic
|
|
locations for training degreed computing specialists, and they
|
|
conduct a diverse array of less applicable and more applicable
|
|
research. In practice, the research interests of CS faculty shape
|
|
the range of topics taught in CS departments, especially the 150
|
|
PhD granting departments. CS curricula mirror major areas of CS
|
|
research and the topics which CS faculty understand through their
|
|
own educations and subsequent research. As a consequence, CS
|
|
courses are likely to avoid important CS topics which appear a
|
|
bit foreign to the instructor.
|
|
|
|
An interesting example of this coupling can be illustrated by
|
|
CTF, in a brief description of public-key encryption systems and
|
|
digital signatures (Hartmanis and Lin, 1992:27). In the simple
|
|
example, Bob and Alice can send messages reliably if each
|
|
maintains a secret key. Nothing is said about the social
|
|
complications of actually keeping keys secret. The practical
|
|
problems are similar to those of managing passwords, although
|
|
some operational details differ because the 100 digit keys may be
|
|
stored on media like magstripe cards rather than paper. In real
|
|
organizations, people lose or forget their password and can lose
|
|
the media which store their keys. Also, some passwords can be
|
|
shared by a group of with shifting membership, and the "secret
|
|
key" can readily become semi-public. The main point is that the
|
|
management of keys is a critical element of cryptographic
|
|
security in practice. But Computer Scientists are prone to teach
|
|
courses on cryptography as exercises in applied mathematics, such
|
|
as number theory and Galois theory, and to skirt the vexing
|
|
practical problems of making encryption a practical
|
|
organizational activity.
|
|
|
|
Today, most of the 40,000 people who obtain BS and MS degrees in
|
|
CS each year in the U.S. have no opportunities for systematic
|
|
exposure to reliable knowledge about the best design strategies,
|
|
common uses, effective implementation, and assessments of value
|
|
of computing in a social world (Lewis, 1989). Yet a substantial
|
|
fraction of these students go on to work for organizations
|
|
attempting to produce or maintain systems that improve
|
|
organizational performance without a good conceptual basis for
|
|
their work. Consequently, many of them develop systems that
|
|
underperform in organizational terms even when they are
|
|
technically refined. They also recommend ineffective
|
|
implementation procedures and are sometimes even
|
|
counterproductive.
|
|
|
|
One defensible alternative to my position is that CS departments
|
|
should not take on any form of organizational analysis. They
|
|
should aggressively take a role akin to Biology departments
|
|
rather than taking on any instructional or research roles like
|
|
Medical schools. To be sincere, this position requires a high
|
|
level of restraint by academic Computer Scientists. First and
|
|
foremost, they should cease from talking about the uses, value or
|
|
even problems of computerized systems that would be used in any
|
|
organizational setting. Research proposals would be mute about
|
|
any conceivable application of research results. Further, they
|
|
should make effective efforts to insure that anyone who employs
|
|
their graduates should be aware that they may have no special
|
|
skills in understanding organizational computing. It would take
|
|
an aggressive "truth in advertising" campaign to help make it
|
|
clear that Computer Scientists have no effective methods for
|
|
understanding computerization in the social world. Further,
|
|
Computer Scientists would forsake their commitments to subfields
|
|
like software engineering which tacitly deals with ways to
|
|
support teams of systems developers to work effectively (Curtis,
|
|
et. al. 1988). Computer Scientists, in this view, would remove
|
|
themselves from addressing organizational and human behavior, in
|
|
the same way that molecular biologists are removed from
|
|
professionally commenting on the practices of cardiologists and
|
|
obstetricians. CTF argues that this view would be self-defeating.
|
|
But it would be internally consistent and have a distinctive
|
|
integrity.
|
|
|
|
In contrast, CS faculty are often reluctant to wholly embrace
|
|
Organizational Informatics. But some CS subfields, such as
|
|
software engineering, depend upon organizational analysis
|
|
(Curtis, et. al., 1988). Further, CS faculty do little to
|
|
advertise the distinctive limitations in the analytical skills of
|
|
our programs' graduates. Part of the dilemma develops because
|
|
many CS faculty are ambivalent about systematic studies of human
|
|
behavior. Applied mathematics and other modes of inquiry which
|
|
seem to yield concise, crisp and concrete results are often the
|
|
most cherished. As a consequence, those who conduct behaviorally
|
|
oriented research in CS departments are often inappropriately
|
|
marginalized. Their students and the discipline suffers as a
|
|
result.
|
|
|
|
Between 1986 and 1989, the total number of BS and MS CS degrees
|
|
awarded annually in the US declined from about 50,000 to
|
|
approximately 40,000. The number of students majoring in CS
|
|
rapidly declined at a time when computerization was becoming
|
|
widespread in many fields. A significant fraction of the decline
|
|
can be attributed to many students finding CS programs insular
|
|
and indifferent to many exciting forms of computerization. The
|
|
decline of military R&D in the U.S. can amplify these trends or
|
|
stimulate a more cosmopolitan view in CS departments. The decline
|
|
in military R&D is shifting the job market for new CS graduates
|
|
towards a markedly more civilian orientation. This shift, along
|
|
with the trend towards computing distributed into diverse work
|
|
groups, is leading to more job opportunities for people with CS
|
|
education who know Organizational Informatics.
|
|
|
|
The situation of CS departments has some parallels with
|
|
Statistics departments. Statistics are widely used and taught in
|
|
many academic disciplines. But Statistics departments have often
|
|
maintained a monkish isolation from "applications." Consequently,
|
|
the application of statistics thrives while Statistics
|
|
departments have few students and modest resources. Might the
|
|
status of Statistics indicate a future possibility for an insular
|
|
approach to CS?
|
|
|
|
The best Organizational Informatics research in North America is
|
|
conducted by faculty in the Information Systems departments in
|
|
business schools and by scattered social scientists (cf. Boland
|
|
and Hirschheim, 1987; Galegher, Kraut and Egido, 1990; Cotterman
|
|
and Senn, 1992; Sproull and Kiesler, 1991). But Computer
|
|
Scientists cannot effectively delegate the research and teaching
|
|
of Organizational Informatics to business Schools or social
|
|
science departments.
|
|
|
|
Like Computer Scientists, faculty in these other disciplines
|
|
prefer to focus on their own self-defined issues. Computer
|
|
Scientists are much more likely to ask questions with attention
|
|
to fine grained technological nuances that influence designs. For
|
|
example, the professional discussions of computer risks have been
|
|
best developed through activities sponsored by the ACM's Special
|
|
Interest Group on Software (SIGSOFT). They are outside the
|
|
purview of business school faculty and, at best, only a few
|
|
social scientists are interested in them. Generally, technology
|
|
plays a minor role in social science theorizing. And when social
|
|
scientists study technologies, they see a world of possibilities:
|
|
energy technologies, transportation technologies, communication
|
|
technologies (including television), medicinal drugs and devices,
|
|
and so on. They see little reason to give computer-related
|
|
information technologies a privileged role within this
|
|
cornucopia. As a consequence, the few social scientists who take
|
|
a keen interest in studying computerization are unfortunately
|
|
placed in marginal positions within their own disciplines. Often
|
|
they must link their studies to mainstream concerns as defined by
|
|
the tastemakers of their own fields, and the resulting
|
|
publications appear irrelevant to Computer Scientists.
|
|
|
|
Further, faculty in these other disciplines are not organized to
|
|
effectively teach tens of thousands of CS students, students who
|
|
are steeped in technology and usually very naive about
|
|
organizations, about systems development and use in
|
|
organizations. In North America there is no well developed
|
|
institutional arrangement for educating students who can
|
|
effectively take leadership roles in conceptualizing and
|
|
developing complex organizational computing projects (Lewis,
|
|
1989).
|
|
|
|
CTF is permeated with interesting claims about the social value
|
|
of recent and emerging computer-based technologies. While many of
|
|
these observations should rest on an empirically grounded
|
|
scientific footing, Computer Scientists have deprived themselves
|
|
of access to such research. For example, the discussion of
|
|
systems risks in the ACM rests on a large and varied collection
|
|
of examples and anecdotes. But there is no significant research
|
|
program to help better understand the conditions under which
|
|
organizations are more likely to develop systems using the best
|
|
risk-reducing practices. There is an interesting body of
|
|
professional lore, but little scholarship to ground it (See
|
|
Appendix).
|
|
|
|
Computer Scientists have virtually no scholarship to utilize in
|
|
understanding when high performance networks, like the National
|
|
Research and Education Network, will catalyze social value
|
|
proportional to their costs. Consequently, many of the "obvious"
|
|
claims about the value of various computing technologies that we
|
|
Computer Scientists make are more akin to the lore of home
|
|
remedies for curing illness. Some are valid, others are unfounded
|
|
speculation. More seriously, the theoretical bases for
|
|
recommending home medical remedies and new computer technologies
|
|
can not advance without having sound research programs.
|
|
|
|
WHAT IS NEEDED
|
|
|
|
CTF sets the stage for developing Organizational Informatics as a
|
|
strong subfield within Computer Science. CTF bases the expansion
|
|
of the discipline on a rich array of applications in which many
|
|
of the effective technologies must be conceived in relationship
|
|
to plausible uses in order provide attractive social value for
|
|
multi-billion dollar public investments.
|
|
|
|
The CS community needs an institutionalized research capability
|
|
to produce a reliable body of knowledge about the usability and
|
|
value of computerized systems and the conditions under which
|
|
computer systems improve organizational performance. In Western
|
|
Europe there are research projects about Organizational
|
|
Informatics in a few Computer Science departments and research
|
|
funding through the EEC's Espirit program (Bubenko, 1992; Iivari,
|
|
1991; Kyng and Greenbaum, 1991). These new research and
|
|
instructional programs in Western Europe give Organizational
|
|
Informatics a significantly more effective place in CS education
|
|
and research than it now has in North America.
|
|
|
|
The CS community in the U.S. has 30 years of experience in
|
|
institutionalizing research programs, especially through the
|
|
Defense Advanced Research Projects Agency and the National
|
|
Science Foundation (NSF). There are many approaches, including
|
|
establishing national centers, supporting individual investigator
|
|
research grants, supporting short institutes to help train new
|
|
investigators and supporting research workshops for ongoing
|
|
research. All such programs aim to develop and sustain research
|
|
fields with a combination of direct research funds, the education
|
|
of future researchers, and the development of research
|
|
infrastructure. They are all multimillion dollar efforts. Today,
|
|
NSF devotes about $125K annually to Organizational Informatics as
|
|
part of the Information Technology in Organizations program. This
|
|
start is far short of the level of funding required to develop
|
|
this field within CS.
|
|
|
|
The North American CS curricula must also include opportunities
|
|
for students to learn the most reliable knowledge about the
|
|
social dimensions of systems development and use (Denning, 1992).
|
|
These opportunities, formed as courses, can provide varied levels
|
|
of sophistication. The most elementary courses introduce students
|
|
to some of the key topics in Organizational Informatics and the
|
|
limitations of Systems Rationalism as an organizing frame (for
|
|
example, Dunlop and Kling, 1991a). More advanced courses focus on
|
|
specific topics, such as those I have listed above. They teach
|
|
about substantive problems and theoretical approaches for
|
|
analyzing them. While many of these approaches are anchored in
|
|
the sociological theory of organizations, CS students usually
|
|
won't grasp the importance of the theories without numerous
|
|
computing examples to work with [4]. They also have trouble
|
|
grasping the character of computing in organizations without
|
|
guided opportunities for observing and analyzing computerization
|
|
in practice. Consequently, some courses should offer
|
|
opportunities for studying issues of computerization in actual
|
|
organizations.
|
|
|
|
Fortunately, a few CS departments offer some courses in
|
|
Organizational Informatics. In addition, some CS faculty who
|
|
research and teach about human behavior in areas like Human-
|
|
Computer Interaction and Software Engineering can help expand the
|
|
range of research and instruction. Curricula would vary, but they
|
|
should include diverse courses for students who seek basic
|
|
exposure to Organizational Informatics and those seek more
|
|
thorough instruction. Unfortunately, only a fraction of the CS
|
|
departments in the US. have faculty who study and teach about
|
|
computing and human behavior.
|
|
|
|
While the study of Organizational Informatics builds upon both
|
|
the traditional technological foundations of CS and the social
|
|
sciences, the social sciences at most universities will not
|
|
develop it as an effective foundational topic for CS. On specific
|
|
campuses, CS faculty may be able to develop good instructional
|
|
programs along with colleagues in social sciences or Schools of
|
|
Management.
|
|
|
|
But delegating this inquiry to some other discipline does not
|
|
provide a national scale solution for CS. Other disciplines will
|
|
not do our important work for us. Mathematics departments may be
|
|
willing to teach graph theory for CS students, but the analysis
|
|
of algorithms would be a much weaker field if it could only be
|
|
carried out within Mathematics Departments. For similar reasons,
|
|
it is time for academic Computer Science to embrace
|
|
Organizational Informatics as a key area of research and
|
|
instruction.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
NOTES
|
|
|
|
[1] See Dunlop and Kling, 1991a for an accessible introduction to
|
|
these debates. Economic statistics about national level
|
|
productivity are inexact, and sometimes weak. Baily and Gordon
|
|
(1988) examined the extent to which measurement problems account
|
|
for the difficulties of seeing the positive computerization show
|
|
up in the US national productivity statistics. They concluded
|
|
that measurements were inexact, and very poor in some sectors
|
|
like banking, measurement errors were not the primary cause of
|
|
difficulties.
|
|
|
|
[2] Organizational Informatics is a new term, and I have found
|
|
that some people instantly like it while others are put off. I've
|
|
experimented with alternative labels, like Organizational
|
|
Computing, which has also resulted in strong and mixed reactions.
|
|
Computing is a more common term than Informatics, but it's too
|
|
narrow for some researchers. Informatics also can connote
|
|
"information," which is an important part of this field.
|
|
Sociological Computer Science would have the virtues of being a
|
|
parallel construction of Mathematical Computer Science, but
|
|
doesn't connote information either. I have not yet found a short
|
|
distinctive label which characterizes the field and whose
|
|
connotations are rapidly grasped by both outsiders and insiders.
|
|
|
|
[3] Jacky's early study was based on published reports, while
|
|
Leveson and Turner's more thorough study was based upon a
|
|
significant body of original documents and interviews with some
|
|
participants.
|
|
|
|
[4] One hears similar concerns about teaching mathematics to CS
|
|
students. CS students are much more motivated to learn graph
|
|
theory, for example, when they learn those aspects which best
|
|
illuminate issues of computation and when their teaching includes
|
|
some good computing examples.
|
|
REFERENCES
|
|
|
|
Baily, Martin Neal and Robert J. Gordon. 1988. "The Productivity
|
|
Slowdown, Measurement Issues, and the Explosion of Computer
|
|
Power." Brookings Papers on Economic Activity 2:347-431.
|
|
Bentley, Richard, Tom Rodden, Peter Sawyer, Ian Sommerville, John
|
|
Hughes, David Randall and Dan Shapiro. 1992.
|
|
"Ethnographically Informed Systems Design for Air Traffic
|
|
Control." Proc. Conference on Computer-Supported Cooperative
|
|
Work, Jon Turner and Robert Kraut (ed.) New York, ACM Press.
|
|
Boland, Richard and Rudy Hirschhiem (Ed). 1987. Critical Issues
|
|
in Information Systems, New York: John-Wiley.
|
|
Bullen, Christine and John Bennett. 1991. Groupware in Practice:
|
|
An Interpretation of Work Experience" in Dunlop and Kling
|
|
1991b.
|
|
Bubenko, Janis. 1992. "On the Evolution of Information Systems
|
|
Modeling: A Scandinavian Perspective." in Lyytinen and
|
|
Puuronen, 1992.
|
|
Cotterman, William and James Senn (Eds). 1992. Challenges and
|
|
Strategies for Research in Systems Development. New York:
|
|
John Wiley.
|
|
Curtis, Bill, Herb Krasner and Niel Iscoe. 1988. "A Field Study
|
|
of the Software Design Process for Large Systems,"
|
|
Communications. of the ACM. 31(11):1268-1287.
|
|
Denning, Peter. 1991. "Computing, Applications, and Computational
|
|
Science." Communications of the ACM. (October)
|
|
34(10):129-131.
|
|
Denning, Peter. 1992. "Educating a New Engineer" Communications
|
|
of the ACM. (December) 35(12):83-97
|
|
Dunlop, Charles and Rob Kling, 1991a. "Introduction to the
|
|
Economic and Organizational Dimensions of Computerization."
|
|
in Dunlop and Kling, 1991b.
|
|
Dunlop, Charles and Rob Kling (Ed). 1991b. Computerization and
|
|
Controversy: Value Conflicts and Social Choices. Boston:
|
|
Academic Press.
|
|
Ehn, Pelle. 1991. "The Art and Science of Designing Computer
|
|
Artifacts." in Dunlop and Kling, 1991.
|
|
Fish, Robert S., Robert E. Kraut, Robert W. Root, and Ronald E.
|
|
Rice. "Video as a Technology for Informed Communication."
|
|
Communications of the ACM,36(1)(January 1993):48-61.
|
|
Galegher, Jolene, Robert Kraut, and Carmen Egido (Ed.) 1990.
|
|
Intellectual Teamwork: Social and Intellectual Foundations
|
|
of Cooperative Work. Hillsdale, NJ: Lawrence Erlbaum.
|
|
Greif, Irene. ed. 1988. Computer Supported Cooperative Work: A
|
|
Book of Readings. San Mateo, Ca: Morgan Kaufman.
|
|
Grudin, Jonathan. 1989. "Why Groupware Applications Fail:
|
|
Problems in Design and Evaluation." Office: Technology and
|
|
People. 4(3):245-264.
|
|
Hartmanis, Juris and Herbert Lin (Eds). 1992. Computing the
|
|
Future: A Broader Agenda for Computer Science and
|
|
Engineering. Washington, DC. National Academy Press.
|
|
[Briefly summarized in Communications of the ACM,35(11)
|
|
November 1992]
|
|
Hewitt, Carl. 1986. "Offices are Open Systems" ACM Transactions
|
|
on Office Information Systems. 4(3)(July):271-287.
|
|
Hughes, John A., David Randall, and Dan Shapiro. 1992. "Faltering
|
|
from Ethnography to Design." Proc. Conference on Computer-
|
|
Supported Cooperative Work, Jon Turner and Robert Kraut
|
|
(ed.) New York, ACM Press.
|
|
Iivari, J. 1991."A Paradigmatic Analysis of Contemporary Schools
|
|
of IS Development." European J. Information Systems
|
|
1(4)(Dec): 249-272.
|
|
Jacky, Jonathan. 1991. "Safety-Critical Computing: Hazards,
|
|
Practices, Standards, and Regulation" in Dunlop and Kling
|
|
1991b.
|
|
Jarvinen, Pertti. 1992. "On Research into the Individual and
|
|
Computing Systems," in Lyytinen and Puuronen, 1992.
|
|
King, John L. and Kenneth L. Kraemer. 1981. "Cost as a Social
|
|
Impact of Telecommunications and Other Information
|
|
Technologies." In Mitchell Moss (Ed.) Telecommunications and
|
|
Productivity, New York: Addison-Wesley.
|
|
Kling, Rob. 1987. "Defining the Boundaries of Computing Across
|
|
Complex Organizations." Critical Issues in Information
|
|
Systems. edited by Richard Boland and Rudy Hirschheim.
|
|
pp:307-362. London: John Wiley.
|
|
Kling, Rob. 1992. "Behind the Terminal: The Critical Role of
|
|
Computing Infrastructure In Effective Information Systems'
|
|
Development and Use." Chapter 10 in Challenges and
|
|
Strategies for Research in Systems Development. edited by
|
|
William Cotterman and James Senn. Pp. 365-413. New York:
|
|
John Wiley.
|
|
Kling, Rob. 1993."Computing for Our Future in a Social World"
|
|
Communications of the ACM, 36(2)(February):15-17.
|
|
Kling, Rob and Charles Dunlop. 1993. "Controversies About
|
|
Computerization and the Character of White Collar Worklife."
|
|
The Information Society. 9(1) (Jan-Feb):1-29.
|
|
Kling, Rob and Lisa Covi. 1993. Review of Connections by Lee
|
|
Sproull and Sara Kiesler. The Information Society, 9(2)
|
|
(Mar-June).
|
|
Kling, Rob, Isaac Scherson, and Jonathan Allen. 1992. "Massively
|
|
Parallel Computing and Information Capitalism" in A New Era
|
|
of Computing. W. Daniel Hillis and James Bailey (Ed.), pp:
|
|
191-241. Cambrdige, Ma: The MIT Press.
|
|
Kling, Rob and Walt Scacchi. 1982. "The Web of Computing: Com-
|
|
puting Technology as Social Organization", Advances in
|
|
Computers. Vol. 21, Academic Press: New York.
|
|
Kraemer, Kenneth .L., Dickhoven, Siegfried, Fallows-Tierney,
|
|
Susan, and King, John L. 1985. Datawars: The Politics of
|
|
Modeling in Federal Policymaking. New York: Columbia
|
|
University Press.
|
|
Kyng, Morton and Joan Greenbaum. 1991. Design at Work:
|
|
Cooperative Work of Computer Systems. Hillsdale, NJ.:
|
|
Lawrence Erlbaum.
|
|
Ladner, Sharyn and Hope Tillman. 1992. "How Special Librarians
|
|
Really Use the Internet: Summary of Findings and
|
|
Implications for the Library of the Future" Canadian
|
|
Library Journal, 49(3), 211-216.
|
|
Leveson, Nancy G. 1992. "High Pressure Steam Engines and Computer
|
|
Software." Proc. International Conference on Software
|
|
Engineering, Melbourne, Australia. (May).
|
|
Leveson, Nancy G. and Clark S. Turner. 1993. "An Investigation of
|
|
the Therac-25 Accidents." Computer July. (Published in 1992
|
|
as Technical Report #92-108. Department of Information and
|
|
Computer Science, University of California, Irvine.)
|
|
Lewis, Philip M. 1989. "Information Systems as an Engineering
|
|
Discipline." Communications of the ACM
|
|
32(9)(Sept):1045-1047.
|
|
Lucas, Henry C. 1981. Implementation : the Key to Successful
|
|
Information Systems. New York: Columbia University Press.
|
|
Lyytinen, Kalle and Seppo Puuronen (Ed.) 1992. Computing in the
|
|
Past, Present and Future: Issues and approaches in honor of
|
|
the 25th anniversary of the Department of Computer Science
|
|
and Information Systems. Jyvaskyla Finland, Dept. of CS and
|
|
IS, University of Jyvaskyla.
|
|
Orlikowski, Wanda. 1992. "Learning from Notes: Organizational
|
|
Issues in Groupware Implementation." Proc. Conference on
|
|
Computer-Supported Cooperative Work, Jon Turner and Robert
|
|
Kraut (Ed.) New York, ACM Press.
|
|
Poltrock, S.E. and Grudin, J., in press. Organizational
|
|
Obstacles to Interface Design and Development: Two
|
|
Participant Observer Studies. ACM Transactions on Computer
|
|
and Human Interaction.
|
|
Sarmanto, Auvo. 1992. "Can Research and Education in the Field
|
|
of Information Sciences Foresee the Future of Development?"
|
|
in Lyytinen and Puuronen, 1992.
|
|
Sproull, Lee and Sara Kiesler. 1991. Connections: New Ways of
|
|
Working in the Networked Organization. Cambridge, Mass.: MIT
|
|
Press.
|
|
Suchman, Lucy. 1983. "Office Procedurs as Practical Ation: Models
|
|
of Work and System Design." ACM Transactions on Office
|
|
Information Systems. 1(4)(October):320-328.
|
|
Winograd, Terry and Fernando Flores. 1986. Understanding
|
|
Computers and Cognition. Norwood, NJ: Ablex Publishing.
|
|
|
|
|
|
|
|
ACKNOWLEDGEMENTS
|
|
|
|
This paper builds on ideas which I've developed over the last
|
|
decade. But they have been deepened by some recent events, such
|
|
as the CTF report. They were also sharpened through a lecture and
|
|
followon discussion with colleagues at the University of Toronto,
|
|
including Ron Baeker, Andy Clement, Kelley Gottlieb, and Marilyn
|
|
Mantei. Rick Weingarten suggested that I write a brief position
|
|
paper reflecting those ideas. At key points, Peter Denning and
|
|
Peter Neumann provided helpful encouragement and sage advice. I
|
|
also appreciate the efforts of numerous other friends and
|
|
colleagues to help strengthen this paper through their comments
|
|
and critical assistance. The paper is immeasurably stronger
|
|
because of the prompt questions and suggestions that I received
|
|
in response to an evolving manuscript from the following people:
|
|
Mark Ackerman, Jonathan P. Allen, Bob Anderson, Lisa Covi, Brad
|
|
Cox, Gordon Davis, Phillip Fites, Simson Garfinkel, Les Gasser,
|
|
Sy Goodman, Beki Grinter, Jonathan Grudin, Pertti Jarvinen, John
|
|
King, Heinz Klein, Trond Knudsen, Kenneth Kraemer, Sharyn Ladner,
|
|
Nancy Leveson, Lars Matthiesen, Colin Potts, Paul Resnick, Larry
|
|
Rosenberg, Tim Standish, John Tillquist, Carson Woo and Bill
|
|
Wulf.
|
|
APPENDIX
|
|
|
|
Published Materials about Computer Risks
|
|
|
|
Unfortunately, there is no single good book or comprehensive
|
|
review article about the diverse risks of computerized systems
|
|
to people and organizations, and ways to mitigate them. The
|
|
Internet board, comp.risks, is the richest archive of diverse
|
|
episodes and diverse discussions of their causes and cures. While
|
|
its moderator, Peter Neumann does a superb job of organizing
|
|
discussions of specific topics each year and also creates
|
|
periodic indices, there is no simple way to sift through the
|
|
megabytes of accumulated comp.risks files.
|
|
|
|
Computerization and Controversy edited by Charles Dunlop and Rob
|
|
Kling (1991) includes two major sections on "security and
|
|
reliability" and "privacy and social control" which identify many
|
|
key debates and reprint some key articles and book excerpts which
|
|
reflect different positions. Another major source is a series
|
|
of articles, "Inside Risks, which Peter Neumann edits for
|
|
Communications of the ACM.
|
|
|
|
This is a list of this series of articles, to date:
|
|
(All articles are by Peter Neumann unless otherwise indicated.)
|
|
|
|
Jul 90. 1. Some Reflections on a Telephone Switching Problem
|
|
Aug 90. 2. Insecurity About Security?
|
|
Sep 90. 3. A Few Old Coincidences
|
|
Oct 90. 4. Ghosts, Mysteries, and Risks of Uncertainty
|
|
Nov 90. 5. Risks in computerized elections
|
|
Dec 90. 6. Computerized medical devices, Jon Jacky
|
|
Jan 91. 7. The Clock Grows at Midnight
|
|
Feb 91. 8. Certifying Programmers and Programs
|
|
Mar 91. 9. Putting on Your Best Interface
|
|
Apr 91. 10. Interpreting (Mis)information
|
|
May 91. 11. Expecting the Unexpected Mayday!
|
|
Jun 91. 12. The Risks With Risk Analysis, Robert N. Charette
|
|
Jul 91. 13. Computers, Ethics, and Values
|
|
Aug 91. 14. Mixed Signals About Social Responsibility, Ronni
|
|
Rosenberg
|
|
Sep 91. 15. The Not-So-Accidental Holist
|
|
Oct 91. 16. A National Debate on Encryption Exportability,
|
|
Clark Weissman
|
|
Nov 91. 17. The Human Element
|
|
Dec 91. 18. Collaborative Efforts
|
|
Jan 92. 19. What's in a Name?
|
|
Feb 92. 20. Political Activity and International Computer
|
|
Networks, Sy Goodman
|
|
Mar 92. 21. Inside ``Risks of `Risks' ''
|
|
Apr 92. 22. Privacy Protection, Marc Rotenberg
|
|
May 92. 23. System Survivability
|
|
Jun 92. 24. Leaps and Bounds (Leap-year and distributed system
|
|
problems)
|
|
Jul 92. 25. Aggravation by Computer: Life, Death, and Taxes,
|
|
Aug 92. 26. Fraud by Computer
|
|
Sep 92. 27. Accidental Financial Losses
|
|
Oct 92. 28. Where to Place Trust
|
|
Nov 92. 29. Voting-Machine Risks, Rebecca Mercuri
|
|
Dec 92. 30. Avoiding Weak Links
|
|
Jan 93. 31. Risks Considered Global(ly)
|
|
Feb 93. 32. Is Dependability Attainable?
|
|
Mar 93. 33. Risks of Technology
|