Descentralizando TI com a adoção de End-User Development: dois estudos de caso

Claudia de O. Melo, Rejane M. da C. Figueiredo, Elaine Venson

Resumo


Contexto: A transformação digital está mudando a indústria e a maneira como usamos a tecnologia da informação (TI). A maior parte dos programas já são escritos por usuários finais com conhecimento do negócio que precisam cumprir objetivos com o uso da TI, embora a governança estabelecida nem sempre seja adequada. A compreensão de como organizar a descentralização da função de TI para usuários finais, de modo a preparar a organização para os desafios e oportunidades do século 21, torna-se chave. Objetivo: Este trabalho tem como objetivo investigar, sob uma ótica socio-técnica, como organizações descentralizam a TI por meio de End-User Development (EUD). Método: Foram conduzidos dois estudos de caso em organizações que buscam a descentralização por EUD há pelo menos 3 anos. Foi descrito um framework conceitual para análise dos casos. Resultados: A maturidade prévia em governança da TI foi fator importante na capacidade de descentralização através de EUD, embora ambos casos não tenham atingido alto grau de descentralização. A TI sombra permaneceu em ambos os casos. Ambas organizações não demonstraram buscar inovação com as iniciativas de descentralização, embora esta seja uma visão fundamental da função de TI no século 21.

Palavras-chave


End-user development; Governança de TI; TI Sombra; Transformação Digital; Estudo de caso

Texto completo:

PDF

Referências


Andriole, S. J. (2015). Who owns IT? Communications of the ACM, 58(3):50–57.

Angeli, A. D., Bordin, S., and Blanco, M. M. (2014). Infrastructuring participatory

development in information technology. In Participatory Design Conference, PDC’14, Windhoek, Namibia, October 6-10, 2014, Volume 1 - Research Papers, pages

–20.

Barker, S. and Fiedler, B. (2011). Developers, decision makers, strategists or just

end-users? redefining end-user computing for the 21st century: A case study. Journal

of Organizational and End User Computing, 23(2):1–14.

Benbasat, I., Goldstein, D. K., and Mead, M. (1987). The case research strategy in studies

of information systems. MIS Quarterly, 11(3):369–386.

Bharadwaj, A., Sawy, O. A. E., Pavlou, P. A., and Venkatraman, N. (2013). Visions

and voices on emerging challenges in digital business strategy. MIS Quarterly,

(2):633–661.

Bradley, R. V., Byrd, T. A., Pridmore, J. L., Thrasher, E., Pratt, R. M., and Mbarika, V.W.

(2012). An empirical examination of antecedents and consequences of IT governance

in us hospitals. Journal of Information Technology, 27(2):156–177.

Bygstad, B. (2016). Generative innovation: a comparison of lightweight and heavyweight

IT. Journal of Information Technology, 32(2):180–193.

Chua, C., Storey, V., and Chen, L. (2014). Central IT or shadow IT? factors shaping

users’ decision to go rogue with IT. In Myers, M. D. and Straub, D. W., editors, ICIS.

Association for Information Systems.

DeLone, W., Migliorati, D., and Vaia, G. (2017). Digital IT Governance, pages 205–230.

Springer International Publishing, Cham.

Dittrich, Y., Bolmsten, J., and Eriksson, J. (2017). End User Development and

Infrastructuring – Sustaining Organizational Innovation Capabilities, pages 165–206.

Springer International Publishing, Cham.

Ferneley, E. (2007). Covert end user development: A study of success. Journal of

Organizational and End User Computing, 19(1):62–71.

Figueiredo, R. M. d. C., Venson, E., Melo, C. d. O., Ramalho, C., Modesto, A. S., Melo,

L. S. d., Nobre, A. J., Moraes, J. M., Ferreira, M. H. P., and Martins, P. (2017). Desenvolvimento pelo usuário final: conceitos, estratégias e casos de adoção: relatório de pesquisa. Technical report, Universidade de Brasília.

Fischer, G. (2009). End-user development and meta-design: Foundations for cultures of

participation. In End-User Development, 2nd International Symposium, IS-EUD 2009,

Siegen, Germany, March 2-4, 2009. Proceedings, pages 3–14.

Fischer, G., Giaccardi, E., Ye, Y., Sutcliffe, A. G., and Mehandjiev, N. (2004).

Meta-Design: A Manifesto for End-User Development. Communications of the ACM,

(9):33.

Frey, T. and Buxmann, P. (2011). The importance of governance structures in IT project

portfolio management. In 19th European Conference on Information Systems, ECIS

, Helsinki, Finland, June 9-11, 2011, page 17.

Furstenau, D., Rothe, H., and Sandner, M. (2017). Shadow systems, risk, and shifting

power relations in organizations. Communications of the Association for Information

Systems (CAIS), 41:3.

Gross, J. B. and Rosson, M. B. (2007). Looking for trouble: Understanding end-user

security management. In Proceedings of the 2007 Symposium on Computer Human

Interaction for the Management of Information Technology, CHIMIT ’07, New York,

NY, USA. ACM.

Gyory, A., Cleven, A., Uebernickel, F., and Brenner, W. (2012). Exploring the shadows:

IT governance approaches to user-driven innovation. In 20th European Conference on

Information Systems, ECIS 2012, Barcelona,Spain, June 10-13, 2012, page 222.

Haes, S. D. and Grembergen, W. V. (2009). An exploratory study into IT governance

implementations and its impact on business/IT alignment. Information Systems

Management, 26(2):123–137.

Karimi, J., Bhattacherjee, A., Gupta, Y. P., and Somers, T. M. (2000). The effects of mis

steering committees on information technology management sophistication. Journal

of Management Information Systems, 17(2):207–230.

Ko, A. J., Abraham, R., Beckwith, L., Blackwell, A., Burnett, M., Erwig, M., Scaffidi, C.,

Lawrance, J., Lieberman, H., Myers, B., Rosson, M. B., Rothermel, G., Shaw, M., and

Wiedenbeck, S. (2011). The state of the art in end-user software engineering. ACM

Computing Surveys (CSUR), 43(3):21:1–21:44.

Koffer, S., Fielt, E., and Niehaves, B. (2015). IT consumerization and its effects on IT

business value, IT capabilities, and the IT function. In 19th Pacific Asia Conference on

Information Systems, PACIS 2015, Singapore, July 5-9, 2015, page 169.

Koffer, S., Ortbach, K., and Niehaves, B. (2014). Exploring the relationship between IT

consumerization and job performance: A theoretical framework for future research.

CAIS, 35:14.

Lieberman, H., Paterno, F., Klann, M., and Volker, W. (2006). End-User Development:

An Emerging Paradigm. Springer Netherlands, 1st edition.

Maceli, M. G. (2017). Tools of the Trade: A Survey of Technologies in End-User

Development Literature, pages 49–65. Springer International Publishing, Cham.

Melo, C., Moraes, J., Ferreira, M., and da Costa Figueiredo, R. M. (2017). A method

for evaluating end-user development technologies. In 23rd Americas Conference on

Information Systems, AMCIS 2017, Boston, MA, USA, August 10-12, 2017.

Niehaves, B., Koffer, S., and Ortbach, K. (2012). IT consumerization - A theory and

practice review. In 18th Americas Conference on Information Systems, AMCIS 2012,

Seattle, Washington August 9-11, 2012.

Panko, R. R. and Port, D. N. (2013). End user computing: The dark matter and dark

energy of corporate IT. J. Organ. End User Comput., 25(3):1–19.

Peterson, R. (2004). Crafting information technology governance. EDPACS, 32(6):1–24.

Ping-Ju Wu, S., Straub, D. W., and Liang, T.-P. (2015). How information technology

governance mechanisms and strategic alignment influence organizational performance:

insights from a matched survey of business and it managers. MIS Quarterly, 39(2):497

– A7.

Richardson, C. and Rymer, J. R. (2016). The Forrester Wave: Low-Code Development

Platforms.

Silic, M. and Back, A. (2014). Shadow IT - a view from behind the curtain. Computers

& Security, 45:274–283.

Stanton, J. M., Stam, K. R., Mastrangelo, P., and Jolton, J. (2005). Analysis of end user

security behaviors. Computers & Security, 24(2):124–133.

Trochim, W. M. (1989). Outcome pattern matching and program theory. Evaluation and

Program Planning, 12(4):355 – 366. Special Issue: The Theory-Driven Perspective.

von Hippel, E. (2005). Democratizing Innovation. MIT Press.

Voss, C., Tsikriktsis, N., and Frohlich, M. (2002). Case research in operations

management. International Journal of Operations & Production Management,

(2):195–219.

Walters, R. (2013). Bringing IT out of the shadows. Network Security, 2013(4):5–11.

Weill, P. and Ross, J. (2004). IT Governance: How Top Performers Manage IT Decision

Rights for Superior Results. Harvard Business School Press, Boston, MA, USA.

Weill, P. and Ross, J. (2005). A matrixed approach to designing IT governance. 46:26–34.

Winkler, T. J. and Brown, C. V. (2013). Horizontal allocation of decision rights

for on-premise applications and software-as-a-service. Journal of Management

Information Systems, 30(3):13–48.

Yin, R. K. (2009). Case Study Research: Design and Methods. Applied Social Research

Methods. SAGE Publications.

Zimmermann, S., Rentrop, C., and Felden, C. (2014). Managing shadow IT instances

- A method to control autonomous IT solutions in the business departments. In 20th

Americas Conference on Information Systems, AMCIS 2014, Savannah, Georgia, USA,

August 7-9, 2014.

Zimmermann, S., Rentrop, C., and Felden, C. (2016). Governing identified shadow IT

by allocating IT task responsibilities. In 22nd Americas Conference on Information

Systems, AMCIS 2016, San Diego, CA, USA, August 11-14, 2016.

Zimmermann, S., Rentrop, C., and Felden, C. (2017). A multiple case study on the nature

and management of shadow information technology. Journal of Information Systems,

(1):79–101.




Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM


iSys - Revista Brasileira de Sistemas de Informação - CESI/SBC
ISSN Eletrônico: 1984-2902