You are on page 1of 34

The Global Network Organization of the

Future: Information Management


Opportunities and Challenges

SIRKKA L. JARVENPAA AND BLAKE IVES

SiRKKA L. JARVENPAA is an Associate Professor of Information Systems at the


University of Texas at Austin. Her research projects focus on global information
technology, strategic use of information systems, and IT-enabled radical business
process innovation. For 1994 she is the Marvin Bower Fellow at the Harvard Business
School. Dr. Jarvenpaa is an associate editor of Management Science, Information
Systems Research, MIS Quarterly, and Database.

BLAKE IVES is Constantin Distinguished Professor and Chairperson of the Manage-


ment Information Sciences Department at the Cox School of Business at Southern
Methodist University. Professor Ives has been a Distinguished Fellow at the Oxford
Institute for Information Management at Templeton College, Oxford, and a Marvin
Bower Faculty Fellow at Harvard Business School. He has also served on the faculty
of Dartmouth College. He is currently an Honorary Research Associate at Victoria
University, Wellington, New Zealand, and an Associate Fellow of Templeton College.
Professor Ives is the Senior Editor of MIS Quarterly and a member of the board of
directors of the Society for Information Management Intemationai and its Dallas
Chapter.

ABSTRACT: The key information processing building blocks for yesterday's organi-
zations were typewriters, carbon paper, filing cabinets, and a government mail service.
The constraints of these crude information processing technologies often required
workers to be located under one roof and organizations to arrange themselves as
efficient, but relatively change-resistant, management hierarchies. Those legacy or-
ganization designs have persisted despite fundamental changes in information pro-
cessing technology. Tomorrow' s successful organizations will be designed around the
building blocks of advanced computer and communications technology. The success
of these organizations will come from the ability to couple to, and decouple from, the
networks of knowledge nodes. These networked organizations will link, on an as-
needed basis, teams of empowered employees, consultants, suppliers, and customers.
These ad hoc teams will solve one-time problems, provide personalized customer
service, and then, as lubricant for subsequent interactions, evaluate one another's
performance. In the network organization, structure will dominate strategy, credentials
will give way to performance and knowledge, and human resources will be the only
sustainable advantage. Despite the promise, networked organizations present difficult

Acknowledgment: We want to acknowledge thefinancialsupport of Faculty Research Grant,


Graduate School of Business, the University of Texas at Austin for thefirstauthor.

Journal of Managemeni Ir^ormation Systems i Spring 1994, Vol. 10, No. 4, pp. 25-57
Copyright © ME. Sharpe, Inc., 1994
26 SnUCKA L. JARVENPAA AND BLAKE rVES

information management challenges. Among these are developing a flexible and


efficient information architecture, establishing new values, attitudes, and behaviors
concerning information sharing, building databases that can provide integrated custo-
mer support on a worldwide basis, and protecting personal freedoms and privacy.
Here, we explore the opportunities and challenges that networked organizations will
present for information technology management.

KEY WORDS AND PHRASES: information systems architecture, networked organization,


organizational knowledge processing, scenario analysis.

1. Introduction
THE MANAGEMENT PRESS PUTS INFORMATION TECHNOLOGY at center stage in a
fundamental transformation of organizational life. Successful organizations are in-
creasingly described as moving towards a dynamic network form [e.g., 22,61,75,80,
82]. Organizations such as General Motors, IBM, Siemens, and Sears achieved their
past success as semipermanent hierarchies focused on multiyear strategic objectives
selected by a small cadre of senior executives. Today, these organizations find
themselves outflanked by agile organizations that, like chameleons, can dynamically
adapt to unanticipated changes in their turbulent environments or to opportunities
revealed through interactions with customers. Advanced information and communi-
cations systems define the boundaries of these new organizations and serve as their
nervous systems. "The winners and losers in the battle for customers" will be
determined by "the incremental differences in companies' abilities to acquire, distrib-
ute, store, analyze, and invoke actions based on information" [22, p. 50].

Described as "spider's webs" [80, 82], dynamic network organizations are spun from
small, globally dispersed, ad hoc teams or independent organizational entities performing
knowledge or service activities. They reshape themselves dynamically as customer
requirements change or as the environment evolves. Network nodes are added to the web
when they can add value, and are disengaged as they are no longer required.
Infonnation technology (IT) is simultaneously an enabler and a strategic instigator
ofthe new organization form. "The threads of the global web are," according to Robert
Reich [82], "computers, facsimile machines, satellites, high resolution monitors, and
modems—all of them linking designers, engineers, contractors, licensees, and dealers
worldwide" [p. 111]. The activities of independent nodes in a network are coordinated
through "a continuously updated information system so that contributions can be
mutually and instantaneously verified" [60, p. 65]. Without the existence of technol-
ogy that permits the point person or point team to "access all the information needed
to serve the customer completely," the implementation of the network type organiza-
tion is unlikely [80, p. 134].
In addition to enabling the global web, information technology is fueling the rise of
the new network form of organization [22]. Global communication networks and
databases increase the mobility of information and knowledge and promote the
dispersal of value-adding processes around the globe. Organizations can extract
information and knowledge components of their production inputs and business
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 27

processes, and move them around the world without inctming major time delays or
transportation, reproduction, or inventory costs. Information technology is also weav-
ing the customer into the ever changing web that collectively adds value from locations
throughout the world. Using common high bandwidth communication networks,
knowledge-based systems, and extensive databases, customers play a direct role in the
design, production, and/or the delivery of the product or service [37, 80]. VTI Inc.
uses its worldwide network to work with clients to create application-specific inte-
grated circuits [80]. From his or her office, a Motorola customer uses a sales
representative's notebook computer to codesign a pager from 29 million possible
combinations [77].
We shall explore here the opportunities and challenges the transformation to the
dynamic network form presents to the infonnation systems field. The article is
organized as follows. To illustrate the nature of this transformation, we present a
scenario in section 2 of what a network organization of the future might look like. In
section 3 we rely on that scenario, other examples, and scholarly and popular writings
to discuss the organizational design, strategy, and human resource management of tbe
dynamic network. Here we also begin to surface the requirements of infonnation and
information technology within the network organization. In section 4, we build on
those requirements to suggest challenges for information systems practice and re-
search. In the concluding section we view the network organization from the perspec-
tive of the information systems executive.
Our focus is on businesses operating globally, although we envision further blurring
of lines between domestic and multinational organizations. Increasingly, "domestic
firms" will participate as knowledge nodes in a global network even if their assets are
owned (an unlikely scenario) by people of only one nation.

2. A Scenario of the IT-Enabled Global Web


A SCENARIO IS A STORY ABOUT THE FUTURE [85]. Scenarios can help business leaders
and researchers predict how organizations might be transformed over time. Here we
use such a scenario to provide a concrete vision of what a dynamic network form might
be like. We will use the scenario throughout to reveal information management
challenges and opportunities.

2 . 1 . Underlying Assumptions

Scenarios are based on assumptions about certain future states and trends. We have
integrated writings from a variety of disciplines to come up with the assumptions that
serve as the foundation for our scenario. In Tables 1, 2, and 3, we present those
assumptions that we feel have relevance to the transformation of a network organiza-
tion. The assumptions are only illustrative of future states and trends. They focus on
technology, the environment, and organization life a decade or more in the future. The
evolution in the deployment of the technology is, we believe, central to many of the
assumed changes in the organization and the environment.
28 SIRKKA L. JARVENPAA AND BLAKE IVES

Table 1 Assumptions about Technology

tnfortnation availability (anything)


• Terabyte memories
• Recording and long-term storage of most digital-based transactions
• Massive heterogeneous and distributed databases
• Worldwide public and private content addressable electronic libraries [96]
• "Knowbots" capable of traveling over networks and then searching computer nodes
for desired information [5]

Connectivity (anytime, anywhere)


• Worldwide wireless networks capable of sending data, voice, and even full motion
video in near real time [5, 12]
• One phone number reaches a person regardless where a person is [32, 69]
• Open systems and standardization [5]
• Worldwide geographical positioning systems [65,29]

Person-machine interfaces (in any form)


• Personal assistants (organizer, savant, concierge [16]
• Speech generation and understanding [68]
• Videophone [67]
• Pen-based computing
• Graphical user interfaces
• Virtual reality [15]
• Electronic rooms (video walls) [7]
• Set of standard productivity tools (electronic mail, calendar systems, intelligent
business forms)
• Automatic national language translation systems [69]

Economics of computing—at little cost


• Two orders of magnitude improvement in cost-performance ratios of computer
memories, microprocessors, etc., over the next decade [5]

Our scenario is set ten to fifteen years in the future. Some aspects of it, particularly
the technology features, will materialize far sooner; others, including many of the
organizational innovations, will take longer to come to fruition and may take another
form. The scenario depicts organizational life for The Worldwide Group, a manage-
ment consulting firm, and for some of its business partners. We will spend an evening
with a globe- trotting consultant who finds herself sharing responsibility for a market-
ing initiative that must be executed in less than 18 hours. The scenario is not intended
to predict with any accuracy the future of the consulting industry. Instead, we use it
to paint a picture that relies for its pigments on reasonably well grounded assumptions
about the future of organizational life. The scenario provides an outline within which
to explore information management policies and such broader societal concerns as
ethics, privacy, and loss of personal autonomy.
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 29

Table 2 Assumptions about Organizations

Structure and control


' Organic and ad hoc organizational designs [62]
• Hierarchies giving way to market and clan structures [54, 60]
• Organizations reducing in size [37, 80]
• Staff functions absorbed into line functions [2]
• Manager role replaced by coordinator and coach roles [71, 80]
• Distributed and decentralized decision making [55]
• Outsourcing [80]
• Strategic alliances [55]

Resource deployment
• Human intellect most valuable asset [2, 22, 80]
• Cosmopolitan management team [2, 82]
• 24-hour window for work day [30, 34]
• Virtual work teams and managers [30, 90]
• Self-managed work teams [33]
• Personalization of human resource management [93]

Organizational strategy
' Mass customization [22, 24, 25, 76]
• Core competencies and capabilities [79, 91]

Table 3 Assumptions about Environment and Competition

Environment
• Increasing environmental uncertainty/turbulence [49, 75]
• Information economy: knowledge as the new source of wealth [97]
• Work growing independent of workplace [35]
• Decreasing economic role of the national government [97]
• More diverse work force [35]
• Nations will seek competitive advantage by investments in education and knowl-
edge infrastructure [35]

Competition
• Continued shortening of product life cycles [75]
• Economic power from services and service industries [80, 82, 97]
• Globalization to reap economies of scale and scope [14, 86]
• Reemergence of entrepreneurship/startups [94]

Although the scenario predicts considerable change in information-related activi-


ties, it assumes little progress in activities that physically move goods and people. A
transatlantic plane trip, for instance, still requires at least five hours, local transporta-
tion will rely on slow ground systems familiar to us today, and in-flight service will
30 SIRKKA L. IARVE>JPAA AND BLAKE IVES

be provided by a flight attendant serving food and drinks from a cart that might be
only slightly more intelligent than we are familiar with today. As we will see, however,
communications systems will often be used to replace or to supplement transportation
systems.

2.2. The Vv^orldwide Group


As the pilot retracted the 787 's landing gear, passenger Tara Rodgers linked her per-
sonal assistant to the onboard computer buUt into the armrest. Although this plane's
systems were no longer state of the art, the display screen was larger and of higher res-
olution than that available on her assistant system. It also provided access to the
airline's electronic amenities. She chose to tune into the airline's audio system, which
provided capabilities similar to those engineered into her personal assistant—connec-
tion to the inflight entertainment, the ability to listen to ground control, as well as the
special circuitry required to eliminate the plane's background noise. She touched an
icon on the screen in front of her and called up the inflight service menu. She canceled
dinner, and eliminated such nonessential messages from flight personnel as the pilot's
sightseeing instructions. She requested a glass of port for two hours later. She did not
expect her electronic documents to attract the attention of the European Community's
customs and immigration system, but she authorized the system to wake her if an on-
board interview with immigration officials was requested. By speaking softly into a
microphone plugged into the arm rest, she completed her custom's declaration elec-
tronic forms. The flight number, date, and trip duration had already been completed
by the airline's computers. She wondered if the customs people knew, or even cared,
about the massive knowledge base and expert systems that were contained in her per-
sonal assistant system or the wealth of information and tools that were immediately ac-
cessible using the worldwide data network to which her firm subscribed.

Rodgers barely noticed the selection of soft classical music that served as background
to her audio system. Her personal profile, stored in her assistant—or was it the
airline's frequent flyer database—had chosen the type of music and preset the volume
based on her personal preferences. The personal profile would also suggest that her
morning coffee be served with cream but no sugar. With the touch of another icon,
Rodgers began to make arrangements for her brief stay in Oxford. This was a spur of
the moment transatlantic crossing, so she had left with no hotel reservations. The elec-
tronic reservation agent her firm subscribed to had meanwhile booked her into the
charming guest house she had been so delighted with during her last visit to Oxford.
Using the travel agent's virtual reality simulator, she wandered into the rooms with
open doors (available to be rented this evening) and selected one with lovely pink
wallpaper, a canopied bed, and a view of one of the colleges. She then booked a car to
pick her up at Heathrow and transport her to Oxford. She could have looked at a short
video segment showing where to meet the cab. Closer to the time of arrival, she could
even look at a prerecorded introduction to her driver or talk to him or her directly. As-
suming on-time arrival, which the onboard computer informed her was 95 percent
likely, and normal early morning traffic, she would arrive in Oxford five hours before
her meeting with Professor Fearl and the prospective customer. For the first two hours
of the fiight there was a great deal of work that needed to be completed. But first she
called home to talk to her husband and proudly watched her littlest one take a few
more faltering steps around the living room.

Across the p.isle she saw a passenger looking briefly at an electronic advertisement for
The Worldwide Group. The advertisement she knew would boast that, "Worldwide
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 31

Group can focus world-class management consulting experience on your business


problem at any time and at any place in the world you require it." She was relieved
when her fellow passenger moved to the next screen. Had he requested further infor-
mation, and electronically confinned as a qualified prospect, she would have been
alerted and expected to start up a conversation with him.
Right now, she had other work to do. With a touch she activated her electronic mes-
saging system and listened again to the message from a senior partner of her consult-
ing firm that had prompted this sudden trip to London. 'Tara, this morning I was
forwarded from our London office a message that had come in from Professor Frank
Fearl at Templeton College at Oxford. Fearl is a well known B-School academician
with the ear of many of Europe's CEOs. Apparently over the years Fearl has worked
closely with our U.K. and European offices on a number of projects that have proven
mutually beneficial to us, Fearl, and clients. London believes that Fearl may have the
inside track on a most promising opportunity, but we need to move quickly and deci-
sively."

"The prospective customer is Empire Software, a U.K.-headquartered firm that special-


izes in the production of integrated softwaie systems for the intemationai freight busi-
ness. Sir Thomas Baker-Knight, CEO of Empire is in residence at Templeton College
for three days attending a Managing Directors forum. Over coffee, Baker-Knight ex-
pressed a concem to Professor Fearl that his firm is not embracing the tumultuous ad-
vances in software engineering and that his management team is poorly prepared to
respond to competitive threats from a variety of unexpected quarters. In an informal
discussion, Baker-Knight expressed considerable interest in a tailor-made educational
offering for the firm's top 100 employees. Fearl has set up a followup meeting with
Baker-Knight for tomorrow aftemoon at Templeton to explore this further. He thinks
that with quick action, we might be able to land this without an arms-length call-for-
proposal process. Fearl suggests a joint effort between Templeton and Worldwide,
where we would use our contacts to supply expertise not available to Templeton.

"Tara, you should recognize Baker-Knight's name; you worked with him five years
ago on a project when he was the head of the development labs at Ray Software Ltd.
and you were working for that unmentionable systems integration house. It was that re-
lationship, and your familiarity with the software industry that caused your name to
spit out when our U.K. people ran this through the relationship-identifier system.
"Empire is a high-growth company that, up to this point, has been very profitable.
Fearl believes there is a strong likelihood of followup business with Empire. Baker-
Knight feels Empire is poorly positioned to operate in the integrated global manner re-
quired by their customers and has not taken advantage of the economies achievable
through advances in software engineering or by reliance on facilities in Eastern Eu-
rope, China, or similar environments. He believes Empire will require the kind of
wholesale organizational reengineering that Fearl has apparently been discussing in
the Templeton program. I've checked our global customer file and see that although
we have not yet assigned a worldwide customer team to Empire, we have had several
small, but promising, engagements with them both in Europe and the Pacific Rim. We
have done nothing here in the U.S. where several of their major facilities are located. I
was therefore pleased when the U.K. asked foi you to act as the primary contact per-
son with Baker-Knight. Frankly, I suspect they would rather use one of their own peo-
ple, but the relationship system protocols gave us first crack at it.
"I've checked your availability over the next two days and it appears that we can reas-
sign most of your responsibilities to other associates. Hopefully, you can pick up the
32 SIRKKA L. JARVENPAA AND BLAKE IVES

remainder from your airplane seat or hotel room. Your contact person in the U.K. is
Jeremy Wainright, a partner in otir London office. Jeremy has worked closely with
Fearl in the past, but has had no previous contact with Empire or Baker-Knight. I have
tentatively contracted with Mary Ellen Smith to serve as your special research assis-
tant. Mary Ellen is a doctoral student at the University of Caiifomia at Irvine who
worked for us several years ago and still participates in special projects. If you so
agree, she will be at your disposal for the next 48 hours, working out of her home.
You might ask her to use our files and external sources to pull together an information
brief on Empire, their major and potential competitors, industry trends, and so on. You
may also wish to draw upon our industry expert network here and in Europe, as well
as rely on our multimedia modules for knowledge about executive education, global
business, and software development."
Rodgers then listened to the forwarded messages from Professor Fearl and from Jer-
emy Wainright in the London office. From corporate records, Rodgers learned that
Wainright was young for a partner but very successful. He appeared, as she did, to
work "out of the box," specializing in projects that required pulling together diverse re-
sources from throughout Europe or other parts of The Worldwide Group's world.
From past experience, she knew this background would be helpful in landing the eon-
tract but also in divvying up any rewards. The firm's reward system still did not fully
reflect either the increasingly global nature of many projects or the use of temporary
teams pulled together from throughout the firm to land contracts such as the Empire
opportunity. Revenue sharing deals were now often negotiated at the operating level
and then approved later at higher levels. Well, at least Wainright knew the informal
rules. From Wainright's 360-degree personnel assessment data, Rodgers also learned that
he was a self-starter, had a penchant for detail, was highly motivated, and cotild be counted
on to deliver. Peers, clients, subordinates, and supervisors, however, were somewhat less
enthusiastic in ralings of Wainright's marketing and relationship-building skills.

Wainright had spoken to Fearl again later in the day and had forwarded that interac-
tion to Rodgers. Wainright had provided the names of several Empire people in the
U.S. and Europe with whom the firm had an ongoing relationship. One of these rela-
tionships, Rodgers noted, pertained to software development productivity. Linking in
to her firm's central databanks (i.e., a vital part of its organizational memory), she
pulled up all the reports related to the project. Among them was a presentation that
had been prepared for and delivered to a technical directions steering committee in
Tokyo just three months before. The findings paralleled Baker-Knight's concerns
about both software development productivity and global reach. Among the recom-
mendations was a call for a management education program and a major relook at the
Pacific Rim development facility. The presentation also identified a major threat from
a systems integrator who had targeted the intemationai freight business for a major
systems integration effort. Rodgers sent an urgent message to the Tokyo partner who
had worked with Empire on the project. Although he was vacationing on a cruise ship
in the Caribbean, the messaging system located him using a geographical positioning
technology and forwarded the message which was provided in both English and Japan-
ese. Rodgers attached the correspondence related to the current project and requested
a quick update and a one-minute summary of the original findings that might be used
tomorrow to help promote the current scheme. She then downloaded the complete text
of the Tokyo presentation into her personal assistant, electronically highlighting key
sections that would be useful tomorrow if the Tokyo connection didn't pan out. As it
was now early in the morning in England, Rodgers resisted the temptation to wake
Wainright, but left a message for him to call her the next morning while she was en
route to Oxford. She also forwarded to him a copy of the Tokyo results.
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 33

Rodgers then tumed her attention to the dossier on Empire prepared by Mary EUen
Smith over the last several hours. As Rodgers anticipated after reviewing her qualifica-
tions file. Smith had produced a rich assortment of documents on Empire as well a
fine overview report. Rodgers entered an electronic reminder to give Smith high
marks when she and the assistant went through the postproject audit. But Rodgers
now required specific information concerning talent that might be willing and able to
participate in the education progiam. Using the global paging service, Rodgers re-
quested Smith to call her. Then she. Smith, and an executive education specialist in
Boston talked through the talent requirements. She needed a list of names within the
firm, within academia, and among independent consultants who were qualified to par-
ticipate in a program such as this. She would require data on fees, availability, areas of
specialty, and evaluations from pievious progiams. Where available, she also wanted
to see short segments of these individuals performing before executive audiences.
Smith would use Gopher IV, a knowbot, to search through faculty expertise files
among all the top-tier business schools around the world. Rodgers asked Smith to
identify five to ten talent candidates and the education sjjecialist to assign someone to
prepare short candidate venues for the program. Prototype venues would include both
lush and economic single-site locations at a midpoint between Empire's many facili-
ties, a European option—^probably at Templeton, and regional locations. Each option
would also require the usual teleconference hookup, thus permitting participants
and/or talent to remain at their home locations but to participate from the now com-
mon conference rooms equipped with multiple video cameras and giant flat screens on
two walls. It was unlikely that Knight-Baker would take a personal interest in the
venue but Rodgers remembered that he kept people on the ball by dipping down into a
level of detail she had found surprising. Using her personal assistant to link to the up-
loaded files from The Worldwide Group's hundreds of other personal assistants, she
discovered that Knight-Baker had a summer home in Bermuda, a piece of infonnation
she passed on to the education specialist as a possible mid-Atlantic resort venue.
Before signing off, the education consultant had downloaded into Rodgers' personal
organizer, a multimedia presentation that the firm had recently used to sell a some-
what similar education project to another client. This boilerplate would save a great
deal of effort and cost in preparing for tomorrow's meeting.
While she waited, Rodgeis prompted the assistant to identify an initial list of individu-
als who might add value to the program. Using just her firm's database, she checked
on availability over the next six months and watched video clips of several professors
working with an executive audience. She called one in Oregon who had worked with
her and Baker-Knight years before. His enthusiasm foi the planned program and obvi-
ous respect and fondness for Baker-Knight were so great that she asked him if she
could use his automatically lecoided remarks, and contagious smile, during her presen-
tation tomorrow. Rodgeis then contacted Cinko Kolors, a multimedia services com-
pany to which hei firm often outsourced graphics work. Cinko Kolois front-ended for
a variety of small, often one-peison, graphics consultants that tended to work out of
small towns, artists colonies, or lesoit locations. These graphic artists provided multi-
media artistic talent while Cinko Kolors marketed services, kept the artists' technol-
ogy up to date, took care of the bookkeeping, and provided technical expertise and
tiaining. Inducements from the Singapore govemment, coupled with that island
nation's superior infoimation technology infrastructuie, had led Cinko Kolois to estab-
lish their legal headquarteis there.
Cinko's Kolors ensured that the customer received worldwide piesentation consis-
tency, copyiight clearances, a standard of quality, and onsite piesentation equipment
34 SIRKKA L, JARVENPAA AND BLAKE IVES

for the end user. Because of the lateness of the hour and short time horizon, Cinko's
Kolors first offered Rodgers an artist on Kuai. Rodgers viewed several short segments
of the artist's work and then, using Cinko Kolor's database, gained assurance of his
ability to deliver in a timely fashion. From her own firm's files Rodgers retrieved and
reviewed a previous project for which this same artist had received high marks. Satis-
fied, Rodgers forwarded logos from her own firm, as well as that of Empire along
with names, titles, pictures of Templeton, pictures of Empire's corporate headquarters,
and the information that would permit the artist to access the previous multimedia pre-
sentation. Cinko Kolors would coUect, and share with the original multimedia design
consultant, a standard fee if that presentation were modified for reuse. Through the
next hour Rodgers and the multimedia artist discussed the initial storyboard for the
ten-minute marketing presentation. Site venues, talent presentation clips, and seg-
ments from her would be forwarded to a companion multimedia artist in London who
would complete the work. The final rough cut of the promotional piece would be avail-
able for Rodgers' review upon arrival in Oxford. Cinko Kolors would ensure that pre-
sentation equipment was available both at her guest house and at Templeton. That
would stiU leave several hours for final edits and perhaps even inputs from Fearl,
Wainright, the firm's European managing director, or the Japanese partner who had su-
pervised the Tokyo project and was now cruising the Caribbean.

Rodgers wrote up a summary of her activities thus far and forwarded it and the vari-
ous working documents and contact people to Wainright and The Worldwide Group's
database. She also took the liberty of recording a 5:30 A.M. wakeup call for him. If the
human resources profile on him was accurate, she could trust him to pick up the ball
and move it forward while she caught a little sleep. She set a relative wakeup call for
herself for 45 minutes before the plane touched down in London. Her personal profiler
would ensure that a gentle voice would awake her with some sweet words of encour-
agement.

As the flight attendant arrived with the port wine, Rodgers reviewed the personal
assistant's profile of Tom Baker-Knight. When she came to work for The Worldwide
Group, the infonnation in her old portable had been transferred to the assistant and,
for all she knew, to the Group's central databanks. Although she had been far less ex-
perienced in those days, she had had the sense to record the wine Baker-Knight had or-
dered and so much enjoyed five years before. She forwarded the name and year to
Wainright, who with his alleged penchant for detail, perhaps might be motivated to
get an Oxford wine merchant to embellish the Templeton College wine cellar before
tomorrow's meeting. Sipping her port with some satisfaction, she downloaded a short
story into the audio system and reclined the seat,

3. The Transformed Organization of the Future—A Dynamic Network


TARA RODGER'S AIRPLA>fE "OFFICE," AND THE OTHER NODES she interacts with,
illustrate the essence of a dynamic network: a globally dispersed and dynamic web of
knowledge nodes drawn together on a one-time basis to address a unique problem. A
knowledge node can be an individual knowledge worker, a team of knowledge
workers, and/or an independent organization. Among the knowledge nodes making
up the web in our scenario are Tara Rodgers, Jeremy Wainright, Cinko Kolors, their
graphic artists, a graduate student at Irvine, and the Japanese partner aboard the cruise
ship in the Caribbean. Knowledge nodes have their own distinctive competency [41,
60]. For instance, the Cinko Kolors' knowledge node adds value that can not easily
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 35

be provided by the various artists the firm represents. Miles and Snow [61] define the
network organization as consisting of "the collective assets of several firms making
contributions at various points of the value chain" [p. 55]. Others describe the
'"virtual corporation' [as] a tightly knit 'family' of independent companies that,
for many purposes, functions as one" [68, p. 40].
Network organizations are described by words such as "open" [94], "virtual" [22],
and "dynamic" [60]. "Open" emphasizes the fluid and flexible nature of the network
inside and outside the knowledge nodes. The legal organizational boundaries of the
nodes have become highly secondary. Information and knowledge exchanges between
nodes of the same legal entity are indistinguishable from those of different legal
entities.^ The web relies to a large extent on public communication services, standard-
ized interfaces, and local personal computer services for exchanging information and
knowledge across nodes.
"Virttial" makes the concept of organization itself a tenuous one. In our scenario,
the problem solving web set up to service Empire has no permanent homebase. Its
current homebase might best be described as Tara Rodger's airplane seat. To Reich
[82], the spider's web has "no 'inside' or 'outside' the corporation, but only different
distances from its strategic center" [p. 96]. The strategic center itself is constantly
changing. The notion of "virtual" challenges the traditional view of a multinational
organization as seeking to gain financial advantage by internalizing transactions
related to capital, product, and knowledge [83]. In the network organization, it may
no longer make sense even to discuss the design of an organization unless we can talk
about knowledge economies of scale.
"Dynamic" refers to the continuously changing mix of partners in the family. The
coupling and decoupling of nodes reaches outside any particular "legal" organization.
At one moment, aparticular node can be a partner in the knowledge network; at another
moment, it may be a competitor or a customer. Tara Rodgers, her boss, and Professor
Fearl assembled a network of nodes for addressing a particular customer's unique
problem in a timely fashion; once that problem is addressed, this configuration of the
network will disappear and its individual nodes become available for attachment to
other network configurations. Any particular configuration of the problem-solving
web is dependent on the customer requirements. Both Davidow and Malone [22] and
Larsson and Bowen [56] call for "thinking in reverse"; customer requirements should
be the starting point of thinking how a problem-solving web should be structured.
The more permanent nodes of a network organization focus on knowledge and
service activities rather than manufacturing or production activities [80, 82]. These
latter functions are often brokered as easily substituted commodities. In the electronics
industry, firms that have practiced outsourcing (i .e., buying their products ready-made
or purchasing a large share of their parts from suppliers) are proving to be considerably
more profitable than those firms that are vertically integrated [36, 81]. Even some
integral intellectual assets might be outsourced if an organization cannot produce them
at world-class quality and cost level [80]. For The Worldwide Group, such assets might
be the knowledge experts used in the executive education program. For Cinko Kolors
it is the artistic talent employed in the production and display of presentation graphics.
36 SIRKKA L, JARVENPAA AND BLAKE IVES

Quinn [80] calls the network organization the "intelligent enterprise" to emphasize
that the network organizations will increasingly differentiate themselves not on how
they manage physical material or product flows, but on how they manage intellectual
and service pitwesses. Similarly to Reich [82], "The key assets of the network
organization are the skills involved in linking the solutions to particular customer's
problems and the reputation that accrues from that" [p. 98]. This implies that even in
manufacturing organizations, the value-adding processes will increasingly center on
intelligence and service activities—managing technology knowhow, product design,
long-term supplier agreements, business partner alliances—rather than managing
internal productivity [80].

3.1. The Competitive Strategy of the Network Organization


Flexibility and responsiveness to the customer's needs are the central tenets of the
network organization's strategy. The network organization focuses on providing high
levels of personalization and customization to the unique and unpredictable needs of
the customer. Yet, maximum flexibility and customization are provided—as much as
possible—at the cost of standardized mass-produced products and services. The
network organization pursues the strategy of mass customization—which combines
strategies of differentiation with those of low cost [77,80].
Mass customization, to the first user of the term, means meeting "the tailored needs
of individual customers and doing so on a mass basis" [24, p. 175]. An organization
that follows the mass customization strategy decomposes its intellect, services, and
products to the smallest possible replicable units (e.g., modules) and then builds
expertise in mixing and matching those to meet the individualized needs of a customer
[24, 77, 80]. The economies of scale arise from repeated use of the same replicable
units. Responsiveness comes from matching the units to serve the specific set of
customer requirements. The matching-up process often occurs instantaneously by the
customer contact person or team, or increasingly by the customer itself. In the global
network organization, the replicable knowledge and service units along with the
mass-produced product components must be managed on a worldwide scale. This
requires structuring the expertise and knowledge into replicable units and storing it in
electronic libraries that are easily accessible anywhere in the world. In our scenario,
Cinko Kolors catalogs old works for subsequent reuse and modification. The specific
talent for Empire Software's education program is identified (not developed) from the
worldwide resource pool of industry experts supplemented by reusable multimedia
training modules. The personalized marketing pitch to Empire is put together from an
existing presentation template.
Mass customization increases the amount and complexity of information collected
on a customer. It accelerates the speed at which this information must be brought
together from varied sources and shared across the problem-solving web. Mass
customization also changes the role of a customer in the production function.
Mass customization requires organizations to collect and store massive amounts of
personal infonnation about their customers [52]. In the era of mass production, a man
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 37

typically bought a shin based on color, sleeve length, and neck size. The customer
was expected to manage his own wardrobe. Today, in an era of mass customization,
the organizations selling garments manage the wardrobe, ensuring that the new shirt
augments the existing wardrobe. In addition, a shirt is individualized to the needs of
the customer. For example, computerized measuring systems measure a man's body
on 40 dimensions (not just three), ensuring that a shirt fitted to not only the body but
to the way the person stands—arms forward, shoulders back, and so on [20],
Mass customization requires a rich information base on the customer attributes and
past activities. Fingerhut, a nonspecialty merchandiser based in Minnesota, serves
over 13 million customers. It captures as many as 1,400 pieces of information about
a household to make detailed predictions about consumer behavior and to engage in
relationship management [6]. Yet, to be useful, these massive databases must be accessible
and meaningful to every knowledge worker who comes in contact with the customs.
Quinn [80], for example, calls for a "Fast-acting 'database system' [that allows] the contact
person to (1) move easily from one specialized data source to another and (2) to mix and
match data in an optimum fashion for each customer" [p. 133].
Mass customization also is the ability to serve the customer at a level appropriate to
the occasion. As The Worldwide Group designs a customer education program, there
are synergistic advantages to being able to view that customer on a global as well as
a local level. Cinko Kolors must deliver a presentation to Worldwide that meets
Worldwide's global consistency and quality standards, but is tailored to the local
context of Templeton. At times the "same" customer is treated as part of one global
entity (i .e., The Worldwide's Group's global presence), sometimes as part of a country
node (The Worldwide Group's U.K. node), and at other times as an individual
knowledge worker (Tara Rodgers). What constitutes a customer changes from one
interaction to another. Data structures must be able to accommodate these multiple
views and meanings and, moreover, allow for their continuous evolution.
Mass customization also changes the role of a customer in the production or service
function. Historically, in a manufacturing-dominated economy, customers were out-
side the production function and viewed largely as a passive source of demand [56].
But personalization may require online customer participation from the first anticipa-
tion of an order, to its specification, to the order itself, to the delivery, to after-service
maintenance, and to in-service measures of effectiveness [52]. For example, Tara
Rodgers requires access to Cinko's database on prior work to qualify the supplier.
Rodgers also forwards material from her own database as well as from Empire and
Templeton (e.g., corporate logos of Worldwide and Empire, and the names, titles, and
pictures of potential industry experts and Templeton faculty) to be used in preparing
for the presentation. All this customer participation in the design, production, and
delivery of the service dramatically increases the volume and complexity of informa-
tion that must be exchanged between the customer and the supplier [56]. Furthermore,
these requirements are difficult to predict. This further fuels the need for highly
dynamic organizational forms and information systems that can integrate and consol-
idate information at the level appropriate for solving a particular customer's problem.
In the network organization, the issues of structure dominate the issues of strategy.
38 SIRKKA L. JARVENPAA AND BLAKE IVES

3.2. The Design of the Network Organization

High reciprocal interdependence is at the heart of a dynamic network. In our scenario,


Tara Rodgers requires a graphic presentation for the following day in a classroom in
Oxford. Cinko Kolors provides a series of services intended, in total, to meetRodgers'
needs. Cinko Kolors helps Tara choose a competent artist by providing online access
to their database of historical performance data, samples of work, and availability
infonnation. Cinko Kolors coordinates the activities of multiple artists and ensures
that proper equipment is available at Oxford and in Tara Rodgers' hotel room.
The high levels of interdependence in the network are managed through market
mechanisms, trust, shared vision and values, common measurement, real-time
information, and communication systems (figure 1). Market mechanisms replace
bureaucratic controls [60]. For instance. The Worldwide Group can choose to do
business with Cinko Kolors or one of their competitors based on price and service
quality. Market mechanisms are, however, no more important than the reputations
of, relationships among, and social contracts formed between the people partici-
pating in the nodes [54, 61]. The trust and knowledge accumulated during prior
exchanges facilitate or impede future interaction among nodes [53]. Consequently,
the network organization embeds market actions in the networks of interpersonal
relationships [40].
Kingston Tech, a leading upgrader of personal computers, exploits the dynamic
network model by relying on a network of trusted external partners to farm out work.
However, it uses few contracts and employs no lawyers: "[Kingston] ships thousands
of products a day, across the globe, on little more than a telephone call" [68, p. 40].
Here is an example how the network works:
One recent Tuesday, a Los Angeles bianch of ComputerLandreceiveda call from
Bank of America. It wanted 100 IBM PCs pionto. The pioblem: They needed lots of
extia memoiy and other upgrades.. .. ComputeiLand called Kingston, which snapped
into action. Within hours it had designed a sophisticated upgrade system—its particu-
lar specialty—and relayed the "specs" to a key partnei. Express Manufacturing. Ex-
press, which specializes in assembling electronic parts, cleared its manufacturing
lines, filled Kingston's older and set the finished systems back that veiy aftemoon. By
evening, Kingston had tested all the components and retumed them, via FedEx, to
ComputeiLand. By the weekend. Bank of America's computers were up and running.
[64, p. 40]

Kingston's business relationships are built on trust. Kingston's foreign distributors


run their exclusive distributorships without written contracts with Kingston. Kingston
often prepays its suppliers. Kingston promises to its network partners, such as Express,
"if you grow with us, you will have our loyalty" [68]. Inside Kingston, company books
are open to its employees.
To function as a network organization, participating nodes have to have a shared
vision and explicit and implicit rules of conduct. A shared vision or objective, the
comerstone of a clan-type structure [73], is necessary to direct and build synergy in
an organization that has dispersed its key decision making. The vision of the network
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 39

Figure 1. Coordination Mechanisms in a Dynamic Network Organization

organization is, however, unlikely to be one tied to a product, service, or market


because of the inability to predict accurately who the next customer is or what product
or service might be needed. Rather, visions are likely to stress building expertise in
flexible customer relationships. Illustrative is Nissan's vision for the year 2000: "any
volume, anytime, anybody, anywhere, and anything" [76].
The "any" vision is maintained and reinforced through common culture, common
meastirement systems, and common communication protocols among participating
nodes. Common culture serves as the common cognitive ground—values and be-
liefs—^and the behavioral ground—manners and protocols. Firms such as Asea Brown
Boweri [87], Unilever [57], and Baker and McKenzie [71] that are evolving into a
network organization are known for their cohesive and "contagious" values and their
ntirturing family spirits. Organizations bring employees around the world together to
emotionally bonding "United Nations General Assembly" meetings. The center of the
network (sometimes no more than one person) serves as the cheerleader and the
missionary of the common values and principles [47]. Shared rules of conduct are
further encouraged via common measurement systems. For example. The Worldwide
Group in our scenario reinforces a common measurement system via the standard
protocol of postproject assessments. At Asea Brown Boveri,^ a worldwide financial
system captures consistent data from 4,500 profit centers making up 1,200 corporate
entities [87]. Monthly financial data from the profit centers are not only aggregated
40 SIRKKA L. JARVENPAA AND BLAKE IVES

on the corporate level, but also fed back into the profit centers so that units can monitor
and compare their performance to the sister units.
Network organizations rely heavily on real-time and full access information for
intemode coordination [60, 47]. Vertical authority and control relationships are
replaced by horizontal information flows. Each node in the network is continuously
nourished with real-time infonnation on each other's activities. At Kao, "All company
infonnation (with the exception of personnel data) is stored in a single integrated
database, open to any employee regardless of position" [72]. Additionally, as is
apparent at The Worldwide Group, trust can to some extent be maintained with
information technology enabled organizational memory rather than personal contact; Tara
Rodgers develops such trust in both her British counterpart, her research assistant, and her
graphic artist by reviewing detailed data depicting their success or skills, demons. Row,
and Miller [19] note that within Rosenbluth International Alliance, IT is critical in
providing information on the service quality and performance that support the ongoing
cooperative relationships across independently owned travel agents in 37 countries.
Miles and Snow [61] believe that "underlying all of the positive characteristics of
network structures is the dynamic of voluntarism" [p. 69]. The dynamic network
models assume that "the various components of the network recognize their interde-
pendence and are willing to share information, cooperate with each other, and
customize their product or service—all to maintain their position within the network"
[61, p. 55]. Tara Rodgers, for instance, willingly shares information with her British
and Japanese colleagues, the graphic designer, and others. Cinko Kolors provides Tara
with access to its database which contains historical performance data, samples of
prior work, and availability information on graphic artists.
The network organization assumes a paradigm shift in the role of information in an
organization. No longer is information viewed as an enablement of control or an asset
to be controlled [51]. Rather, the goal is to tum information into knowledge by
marrying human expertise with information. The more sources of expertise brought
to bear on the information, the greater the potential for knowledge generation [72].
Hence, the value of infonnation comes from being shared across knowledge workers,
across knowledge nodes, and across networks. Quinn [80] emphasizes that knowledge,
unlike most resources, increases in value as it is shared: " As one shares knowledge
with colleagues and other internal organizations, not only do these units gain infor-
mation—^linear growth- they usually feed back questions, amplifications, and modi-
fications, which instantly add further value for the sender" [p. 254]. According to
Quinn [80], "Planned knowledge sharing thus creates exponential value-added growth
through 'network benefits' up to the point where individuals encounter information
overload" [p. 254].

3.3. Human Resource Matiagement in the Network Organization


Much more than the traditional functional, product, and matrix organizations, a
network organization relies on its knowledge workers and their continued ability to
leam and grow. A manager in a company with annual revenues of $2 billion that has
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 41

adopted many of the characteristics of the network organization recently reflected,


"organizational capabilities are always much ahead of people capabilities." The
human resource management in a network organization requires empowered knowl-
edge workers, continuous reskilling, personalized human resource practices, and a
well-designed organizational memory. Each of these has implications for information
technology.

3.3.1. Empowering Knowledge Workers

There are many different ways to empower workers. Conferring authority is one,
accompanied by expertise and relevant information [47]. The chairman of Motorola
tells his "sales force that they have all the authority of the chairman when they are
with customers" [47, p. 64]. Team organization, where no information differential
exists among members and where everyone acts on equal terms, leads to empower-
ment [2,72]. To others, empowerment means directed autonomy and assumes well-
socialized, trained, and informed employees [8,22].
Employees are considered empowered when they (a) get information about organ-
izational performance, (b) are rewarded for contributing to organizational perfor-
mance, (c) have the knowledge and skills to understand and contribute to
organizational performance, and (d) have the power to make decisions that influence
organizational direction and performance [8]. Companies such as Sony and VeriFone
have installed new financial systems that report daily consolidations of worldwide
sales directly to employees. Firms we are familiar with equip every employee's
personal computer with a window displaying in real time "how are we doing" data
such as the firm's current stock price. Such systems can help focus employee and team
efforts toward the problems and opportunities facing the broader organization. Real-
time feedback and complete information access could also be applied to business
process measures such as order-taken to revenue-collected turnaround times, customer
callbacks, work-in-progress inventory, and so on. For instance, at the Conner Springs
Company, a metal worker is provided with "full and instant access to data about the
jobs he or she is working o n . . . . An employee who spots (or develops) a problem with
a job can go the the computer and put a 'shop hold' on it" [17, p. 57]. Data are thus
provided "to those who need them in their jobs, with no managerial spin, because you
have trained front-line workers [who know how] to use them" [33].

3.3.2. Lifelong Learning of New Skills

Knowledge workers in a network organization must be "enabled" as well as "empow-


ered" [22]. Although some skills, particularly those that are routinized, are outsourced,
many are obtained from knowledge workers who belong to the knowledge nodes. Yet,
because of unpredictable and ever-changing customer requirements, Bartlett and
Ghoshal [4] join the chairman of Coming Glass [69] in deemphasizing any particular
set of skills and emphasizing an individual's propensity to adapt, to be fiexible, and
to be willing to continually leam new skills. Specific technical skills are particularly
42 SIRKKA L, lARVENPAA AND BLAKE IVES

likely to be of value for a short duration of time or on an occasional basis. Conse-


quently, individualized "just in time training" will become much more common. Such
training is likely to characterized by: (1) involvement of a multimedia-based electronic
tutor, 2) personalization to the needs, intelligence, and skills of the employee, (3)
giving participants opportunities to interact directly with simulations of real-world
situations, and (4) use of expert systems for training that can later be used as electronic
consultants in the workplace.

3.3.3. Personalized Human Resources Practices

Not only will the development of skills become more personalized, the performance
of the knowledge worker will be much more closely tied to his or her compensation.
Knowledge work, unlike manual work, consists of creation, manipulation, and com-
munication of symbols. The oulputs of knowledge work and partly the process
accompanying the work can be electronically captured and stored. Personalized
compensation programs can be driven from databases containing the employee's
activities along with evaluations from completed projects. For instance. The World-
wide Group's postproject feedback from peers, subordinates, superiors, and others
provides the basis for such a compensation scheme, though one might anticipate some
cross-cultural resistance to such a scheme. Individually tailored compensation
schemes might also implement what Handy [47] calls "Type Two" accountability,
answering these questions: did the specific employee seize every opportunity, make
all possible improvements to satisfy the customer? But compensation schemes must
also be heavily oriented toward the success of the specific team as well as the specific
individual [33]. A detailed trail of team member activities will provide the ability to
assess the relative contribution of each member to the team activities.
In the network organization, human resource management is likely to be dispersed
to empowered employees and problem-solving teams. Prior research has shown that
when activities of the team members become highly interdependent and interwoven,
only the team itself has enough knowledge of how the actions taken by the members
relate to the results they have produced to carry out the team member development
and evaluation activity. Those outside the team (e.g., at the strategic center of the
network organization) are limited to influencing employee selection [89].
As human resource decisions are delegated to teams, infonnation systems can be
used to diffuse the organization's best expertise on employee hiring, selection,
evaluation, and coaching [9]. Systems can be used to help make and debias perfor-
mance appraisals and salary allocations. They can also play a role in tracking, aging,
and developing skills, as well as in helping teams build individualized performance
targets that are directly linked to customer measures such as satisfaction. Systems
might provide real-time feedback to the team on meeting its targets. Systems are also
seen as keys in enabling employees to manage their own flexible and personalized
benefits packages [9].
Federal Express's PRISM system [74] illustrates an early form of what the person-
alized human resource management systems of the future might look like. PRISM
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 43

provides coaches with direct input and online access of all personnel and skill data
for their team members. All employees can preview their own personnel data in real
time. The system provides online applicant processing, hiring, processing employee
benefits, job posting, bidding, training and testing, safety and security, EEO/affirma-
tive action, and computer-based management by objectives.^ PRISM also encom-
passes interactive video training modules that adapt to the employee's level of
knowledge. The system facilitates relocation of people to jobs throughout the FedEx
world, thus providing employee with a rich set of job opportunities. PRISM also
helps prescribe personalized training and development programs. The system assists
coaches, not the personnel manager or department, to hire employees, track and
manage their skills, and evaluate employees online.

3.3.4. Building Organizational Memory

One potential risk of empowering employees is that decentralization can result in a


loss of organizational leaming [22] and, with it, of the abilities to leam from the past,
to generalize across problem environments, to recognize synergistic opportunities, and
to transfer leaming quickly and efficiently throughout the organization [39]. Sharing
of knowledge is further jeopardized by the unstable structure of the network—^knowl-
edge nodes continually joining and departing. Although organization members benefit
from continuous leaming and new relationships from inside and outside the organiza-
tion, those benefits do not automatically accrue to the organization as a whole. In fact,
without careful management, the relative power of the individual knowledge worker
versus the strategic center of the organization could shift noticeably in the direction
of the knowledge worker. To ensure organizational leaming and a balance of
power requires the kind of organization memory described for The Worldwide
Group. The firm stores in company wide databanks the outcome and process details
of all prior consulting engagements, including evaluation of internal and external
service providers. The system identifies relationships between the client and the
Worldwide personnel that were established in the engagement. The system even
captures prior relationships the personnel had before joining Worldwide and
apparently some rather informal, subjective, information from individual consul-
tants work files. The memory interfaces with the firm's global human resources
systems to assist in identifying skills and expertise. Illustrations of such emerging
corporate memories are the Shadow Partner prototype at KPMG Peat Marwick
[42], online Knowledge Resource Directory at McKinsey and Co. [16], and
Customer Reference File and Audit Reference and Resource CD-ROM systems at
Arthur Andersen and Company [80].

4. Challenges for Information Systems Practice and Research


THE DESCRIPTION OF THE DYNAMIC NETWORK FORM, as well as our scenario, illustrates
a rich set of opportunities for information and communication technology. Other
observers [e.g., 47, 60, 80, 82] have predicted the critical role that IT plays in the
44 SIRKKA L, JARVENPAA AND BLAKE IVES

network organization. However, as implied above, the network organization makes


assumptions about information policies and management that, based on the practices
of today's organizations, appear Utopian. For example, the dynamic network model
assumes that infonnation is gathered, stored, and disseminated not to control, but to
generate knowledge valued by a customer. Second, the scenario assumes that
infonnation is available and accessible to any person, in any form, at any time who
comes in contact with the customer. The scenario also assumes that knowledge
workers work in empowered self-directed teams and that they know how to use
information. It also assumes that the replicable modules of expertise and knowl-
edge of its knowledge workers and records of the knowledge workers' past
activities are stored in an organizational memory. Next, we discuss these require-
ments as challenges for the information systems practice and research. Table 4
summarizes the challenges.

4.1. Building a Flexible and Efficient Infonnation Architecture across


Knowledge Nodes

The dynamic network form assumes broad sharing of information at the transaction
level within and across legal organizational entities. Broad sharing requires a
highly adaptive infonnation architecture that can provide anytime-anyplace, mul-
timedia interconnectivity across a constantly changing network of nodes. The
infonnation architecture must accommodate quick coupling and decoupling with
value-adding partners. Information architecture must be independent of any orga-
nization structure.
Allen and Boynton [1] describe two approaches for achieving efficient and
flexible information architecture: the low road, or decentralized approach, and the
high road, or centralized approach. Although both approaches can lead to an
architecture with high information connectivity, Allen and Boynton suggest envi-
ronments appropriate for each. The low road seems appropriate when the needs of
the various businesses are diverse, the relationships among businesses complex,
and the emphasis is on effectiveness and local responsiveness. The high road, with
its centralized architecture, provides a more direct road to sharing, but only when
the business is stable and uniform, with emphasis placed on efficiency rather than
on effectiveness. Given the network organization's needs for mass customization,
flexibility, empowerment, and constant reconfiguration, some sort of modified
low-road approach seems most appropriate. Even this approach as prescribed by
Allen and Boynton assumes agreed-upon definitions for shared data and common
communication interface protocols, as well as "a philosophy of full access to
information" [1, p. 436]. Agreed-upon definitions and common protocols assume
a static or stable business environment and hence go against the environmental
assumptions of the network organization. How to manage information architecture
in a highly dynamic organization is a rich, but challenging, subject for further
research.
GLOBAL NETWORK ORGA>fIZATION OF THE FUTURE 45

Table 4 Information Management Challenges of the Network Organization

1. Building a flexible and efficient information architecture across knowledge nodes


2. Creating the values, attitudes, and behaviors of information sharing
3. Developing individual competency related to information access and use
4. Leveraging and interfacing with public information resources
5. Building applications and databases around global customer relationships
6. Using information technology to manage and leverage l<nowledge workers world-
wide and to build barriers for their exit
7. Understanding the boundaries and limitations cf information technology in enabling
the virtual corporation
8. Protecting personal freedom and privacy
9. Understanding the sociology of the mobile workplace

4.2. Creating the Right Values, Attitudes, and Behaviors for


Information Sharing

Free flow of datareqtiires technical interoperability and shared information databases


and applications. But it also requires that nodes participating in a common network
are willing to give the other knowledge workers and nodes broad access to their
infonnation resource. Unfortunately, firms have had limited success thus far in
developing enterpdsewide data architecture plans and making subsequent use of them
[43]. By design, traditional organizations are structured to protect and control infor-
mation. Individuals are seen as owners of information. Their power arises from the
data that they own. Individual managers are rewarded for what they know that others
do not know, rather than what the manager contributed to others' learning and the
overall organizational memory. Davenport et al. [21] remind us, "No technology has
yet been invented that can convince unwilling managers to share information or even
to use it" [p. 56]. They argue that in a highly unstable organization (such as the network
organization), organizational members have little incentive to share their information
freely. Information, after all, is one of the main things that increases an employee's
value to the organization in a highly uncertain environment. How does one create an
environment that values and promotes information sharing?
Creating the right values, norms, and behaviors regarding information sharing is one
of the great challenges facing the transformation to the network form. Figure 2 depicts
the various layers that are often discussed in the context of seamless information
architecture and information use. Most of the discussion tends to focus on the bottom
three layers: (1) standards and protocols, (2) data compatibility, and (3) a map of
organization's information resources (i.e., strategic data plan). Less attention has been
given to the top three layers: (4) applications that cross functional boundaries or that
begin to help invoke, respond to, or predict customer behavior, (5) the individual's
capability to use information, and (6) creating a culture that promotes information
sharing. It is perhaps the top three layers that are the most important in turning
46 SIRKKA L. JARVENPAA AND BLAKE IVES

information into knowledge that has business value. Next we will address the top layer:
the values, attitudes, and behaviors of information sharing.
Davenport et al. [21 ] have proposed alternative models for managing the politics
of information sharing. Their preferred model, "federalism," nurtures the volun-
tary and participatory spirit of the network organization, but appears to impede the
speed with which new nodes can join the network. "Federalism," according to
these authors, "treats politics [of information] as a necessary and legitimate
activity by which people with different interests work out and among themselves
a collective purpose and means for achieving it" [p. 59]. Further, "federalism
require[s] informed participation of all organizational citizens" [p. 64]. But gain-
ing consensus across dispersed knowledge nodes is likely to be a slow and
time-consuming activity. In the network organization, information sharing agree-
ments would have to be based on individualized negotiations between each joining
node and the rest of the network. And the requirements of the sharing arrangements
will probably change from one customer situation to another. Particularly, given
the dispersed nature of the network, some of the negotiations might have to occur
electronically. Unfortunately, it has been estimated that it takes four times as long
to reach consensus via electronic means in a nonsimultaneous encounter than via
a face-to-face meeting [90].
Would a constitutional monarchy be a better information sharing model for the
network organization? In a constitutional monarchy, a document exists that out-
lines "the monarch's limitations, the subjects' rights, and the law's authority"
about the information collection, use and sharing along with the enforcement of
the "laws" [21, p. 52]. To succeed in the long run, the constitutional monarchy
must be embedded in the values and norms of the organization. The social fabric"*
would embed the "laws" about information sharing and direct the members'
behaviors about information management. Similarly, conformance to technical
interoperability standards and naming guidelines would be used as a prerequisite
for continued participation in the network. Given that new standards and new
values are difficult to diffuse through an existing entrenched organization, the
constitutional monarchy model favors new organizations that are free from old
legacies of information management.
We propose another view for information sharing in the network organization.
This view mirrors the concept of auction block and involves an even greater
paradigm shift in information management. This view moves away from using
information to protect future income and toward one of conceptualizing informa-
tion as a means to generate future income. Information sharing would become
essential in continually maintaining the knowledge worker's credibility, reputa-
tion, and the trust of potential business partners. Similar to an auction, the buyer
is free to inspect the merchandise prior to the sale. Tara Rodgers, for instance,
examined previous work by her graphic artist as well as evaluations of the artist's
work by other Worldwide Group customers. But, unlike the auction, the buyer also
has the opportunity to register disappointment, and thus impact future prospective
purchasers' behavior, if the product doesn't live up to expectations. The network
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 47

High Low
\ Values, attitudes, and behaviors of information sharing

\ Individual competency in information use

Crossfunctional business
I
applications triggering actions
> from information
en
Enterprise model of
organizational infonnation
resource

Software
3
compatibility

Low High

Figure 2. Toward Seamless Use of Infonnation

organization more tightly couples performance with compensation and future work
opportunities. Today, potential partners look at credentials, resumes, endorsements,
recommendation letters, and self-promotion. In the futtire they will instead traverse
databases containing information and evaluations on past works as well as the works
themselves. Tara Rodgers' or Jeremy Wainright's search for future lucrative business
opportunities necessitates that they publicize their performance data and skills inventories.
Again, the question remains whether this view of information sharing is only viable for
new organizations or whether an existing organization such as IBM or General Motors
can so dramatically change its values with respect to information management. Again,
much research is needed to explore which models and views of information sharing are
best suited for the dynamic network form.

4.3. Developing Individual Competency on Information


Access and Use
The network model assumes a scientific or systematic approach to solving custo-
mer problems. Organizations rely on knowledge and information accumulated on
their customers rather than hunches, guesswork, or pushing products designed for
broader markets. This requires a level of professionalism and rigor in problem
solving and decision making that is rare in most organizations today [39]. Also
required will be skills in accessing and using structured and unstructured informa-
tion in problem solving. Knowledge workers must be given the skills required to
navigate through the ever-growing, and increasingly unstructured, data contained
in internal and external databases. They must also be taught how to use information
48 SIRKKA L. JARVENPAA AND BLAKE IVES

efficiently as well as to use filters and willpower to avoid information overload as well
as the contagion of unlimited access to knowledge-based resources. These require-
ments, coupled with the sophisticated new pedagogical approaches that information
technology is making possible, call for a complete overhaul of our current approach
toward educating managers about information technology.

4.4. Leveraging and Interfacing with Public Information Resources

In the scenario, Tara Rodgers used several public information sotirces, including
Gopher IV, to examine the talent pool of the best business schools from around the
world. We see two parts to an organization's information asset: internal (proprietary)
and external (public). The internal part might include the knowledge bases (such as
relationship systems, expertise moderators, consulting methodologies) and perhaps
some of the software that manages those bases. The destruction or compromise of the
internal architecture would simultaneously destroy or compromise the core "intellig-
ency" of the network. The external pieces would include all the commodity pieces
such as the hardware, general-purpose software tools, and much of the network
management and other public services and databases. Some applications might be
industry-based cooperative information systems where network externalities exist.'
Policies for managing the marriage between the firm's proprietary information asset,
public services, and cooperative applications are needed.

4.5. Building Applications and Databases around the


Global Customer Relationship

The need to provide personalized products and services to a global customer presents
its own set of information management challenges. Speed and agility will be critical
for timely response to the customers' needs. Some dimensions wUl require global
uniformity while other dimensions will require local tailoring. Information systems
today do little to support an integrated global customer view [50]. In many cases they
present severe barriers. Sales and marketing systems tend to be product-based, not
customer-based. Moreover, multinationals have tended to let country units develop
their own customer, order, and sales support information systems. There is often little
resemblance among these systems in functionality, data structures, hardware plat-
forms, or even in the ways the customer is identified. This heritage offers a rocky
foundation upon which to develop an integrated worldwide interface to customers. A
likely increase in strategic alliances, temporary partnerships, corporate acquisitions,
and spinoffs adds further complexity to maintaining a single customer image. This
promises to be a very expensive undertaking. One British bank expects to spend $2
billion to reverse the historical functional and product constraints built into its systems
[80]. And they are operating primarily within a domestic context.
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 49

4.6. Using Information Technology to Manage and


Leverage Knowledge Workers Worldwide and to
Build Barriers to Their Exit
Firms face the same problems providing a unified human resource system as they do
in providing for a unified view of their customers. In many firms, human resource
systems are little more than extensions of payroll systems, helping to manage em-
ployee records,compensationandbenefits administration [9]. Moreover, many human
resource departments find themselves under fire, or even being dismantled, partially
because of their inability to help the organization adapt quickly. Yet knowledge
workers are the most critical production input in the network organization. Conse-
quently, a high payoff area of research is to help organizations understand how
information technology can be used to attract, select, nurture, and leverage knowledge
workers. And, as valued workers will find they can easily market their skills to other
firms, it will be necessary to build barriers to their exit.
Another challenge is to build human resource systems that are global in scope.
Because of major differences in job descriptions, pay scales, and govemmental
reporting requirements, very few global firms have attempted to develop global human
resource systems [50]. Laws pertaining to transborder data flows, although not a major
barrier to most business transactions, can constrain the movement of sensitive em-
ployee data. In general, privacy issues are a major concem, particularly as highly
detailed performance data are gathered and potentially shared across legal organiza-
tional and country boundaries. Research is needed on the type of review and correction
procedures that organizations will need to have in place to avoid unjustified damage
to a person's reputation. Research is also required to help organizations understand
the legal constraints for building sophisticated human resource systems.

4.7. Understanding the Boundaries and Limitations of


Information Technology in Enabling the Virtual Corporation
The network organization assumes that infonnation technology connects geographi-
cally dispersed individuals working together on a customer's problem. But for what
type of activities are "virtual" or "electronic" teams viable and when do team activities
require face-to-face meetings? Some observers claim that there is no substitute for
face-to-face meetings in terms of interactivity and the amount of information ex-
changed [28,47]. While there are examples of virtual teams, most are of limited duration
or restricted to tasks that were highly stmctured and definable, such as software develop-
ment [34,90]. Considerably more must be discovered about the necessary task conditions
and prior relationships for a virtual team to operate. For instance, how much time, if any,
must the group have to spend socially to be effective [7]? How much of this socialization
can occur via video-walls and via electronic mail versus face-to-face?
De Myer [26] studied the communication and information flows of 14 multinational
companies' international R&D organizations. Although he found the use of informa-
50 SIRKKA L. lARVENPAA AND BLAKE IVES

tion technologies (e.g., telephone, fax, videoconferencing, computer conferencing,


electronic mail, and engineering databases) to be common, use was limited to
coordinating information (schedules, lab results, lists of publications) rather than on
solving problems and sharing knowledge (knowhow about the experiment or the
analytical work). Moreover, initial face-to-face meetings were necessary to build a
relationship, and hence confidence, between the team members so the subsequent,
electronic communications were meaningful. Periodic face-to-face meetings were
also necessary to counteract the decay that occunred over time in confidence when
electronic means of communication were used. Similar findings were reported from
a desktop video conferencing study where all participants were housed in the same
location [28]. The technology was insufficient for getting problems solved or making
decisions that were intellectually difficult. The technology, however, helped in main-
taining relationships, exchanging routine task and status information, scheduling,
getting prepared for work, and so on. The desktop videoconferencing session was
perceived to be closer to a telephone than to a face-to-face session [28].
Yet, organizations are trying to stretch the bounds of their electronic networks and
accomplish more "real" knowledge work via virtual forms. For example, VeriFone, a
multinational that has 60 percent of the U.S. market for credit-card purchase authori-
zation services, relies largely on electronic communication and online databases to
run its everyday business. New employees get laptops before they get desks. Company
management, including top executives, are distributed geographically; more than
one-third of the employees are on the road half of the time. Ordinary paper mail is
banned internally; nearly all its work processes rely on electronic processing and
distribution. Employees have online access to bookings, shipments, revenues, detailed
personnel data, everyone's travel schedules, order status, progress with sales pros-
pects, and various news services. Customers are encouraged to communicate via
E-mail as well. Time zones are considered a blessing in this dispersed company. Work
is passed around from one time zone to another to keep the project progressing 24
hours without relying on overtime. Moreover, VeriFone has been able to create this
virtual corporation with 1980s mainframe and personal computer technology [30].
A rich set of research issues surround the understanding of the limits to the electronic
virtual forms and how those limits change as people gain experience in the new forms.
What level of bandwidth and technological sophistication is required to create a
sustained virtual interaction in knowledge related activities? What level of socializa-
tion must precede such interaction? How often must such interaction be supplemented
with face-to-face meetings? Research by Finholt and Sproull [27] suggest that the
"bandwidth" (i.e., richness) of the technology is as much a social and psychological
attribute as a technical one. How a particular communication technology is used
depends on what other media are available for an individual and a group.

4.8. Protecting Personal Privacy and Freedom


Our scenario relies heavily on electronic capture of detail information on both the
process and outputs of knowledge work and sharing that captured information among
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 51

network participants. These practices open a wealth of privacy, security, and solitude
threats. But to prohibit or enact laws against these activities, as some European
countries have done^ [6], considerably lessens the promise of the network organiza-
tion. The network organization assumes free flow of infonnation about employees
within the network and among alliance partners and hence decreasing ability of an
individual to control what information is shared about him- or herself. It has been
suggested that there may be no private life in cyberspace [3].
The unique attributes of the information resource make it particularly vulnerable to
privacy and security violations. For instance, information may be stolen from across
the world but still appear to its owner to be uncomproniised. Also, once the information
is read, it becomes a part of what that person knows, making the violation irreversible
[95]. As the U.S. government has demonstrated with a mammoth security bureaucracy,
attempting to classify infomiation on a document-by-document basis is expensive,
time-consuming, and an inhibitor of innovation. Although advances in encryption
techniques should ease some of the problem, purely technical solutions are unlikely
to resolve the social dilemma [3]. Research to date emphasizes the need to inform
individuals and get their consent for information that they might consider private or
proprietary [18, 59,92]
A related area pertains to computer monitoring [e.g., 44]. Although computer
monitoring tends to be negatively viewed in the popular literature, it has been used
successfully, for instance, in the microchip production and inspection process at
Hughes Aircraft Company [45]. The Hughes system is used not as a managerial
surveillance tool, but as a way to provide feedback to team members as to how the
team can improve its processes and subsequently the quality of products. The captured
data are also used to develop a neural network system that will assist team members
in quality inspection. Griffith [45] argues that the intention of electronic monitoring,
not the monitoring itself, determines whether the employees view it positively or
negatively and how monitoring affects the quality and quantity of work.
An area that has received little research attention is the loss of a person's control
over others' intrusion into his or her space or consumption of his or her time (i.e.,
solitude). In a global world where it is always business hours somewhere, "personal
freedom" takes on a new meaning. Tara Rodgers, for instance, set a 5:30 A,M, wakeup
call for Jeremy Wainright, while Tara's own boss took the liberty of booking her on
a flight to London. Twenty-four-hour operations, "anytime, anyplace, anywhere"
phone numbers, cellular telephones, voice mail accessible from home, home comput-
ers, pagers, beepers, ubiquitous security cameras, phones that display the number
called from, cal! waiting, geographical locating services, and performance monitoring
databases seem destined to produce a considerable reduction in personal freedom. Big
Brother may indeed soon be watching, but probably not in the person of the techno-
logically plodding government. Instead, Big Brother takes shape in the collective
impatience of the efficient secretary, a needy customer, a desperate subordinate, a
spouse, the obnoxious person with the portable phone sitting at the next table in the
restaurant, or a colleague prescribing the time of your wakeup call. Fish et al. [28], for
example, found that while superiors did use the desktop videosystem to check on their
52 SIRKKA L. JARVENPAA AND BLAKE IVES

subcffdinates, the subordinates woe twice as likely to check on their superiors and to hold
spontaneous convocations than thereverse.As expected, the recipients of the COT versadonal
attanpts woe much more cOTConed with intrusion than the initiators of convosations. In
summary, while the customer surely will get betto- service in the future, it comes at a price
in personalfreedfxnOVCT solitude that the customs may never have intaided to pay and for
which the knowledge wwker may receive little extra compensation.

4.9. Understanding the Sociology of the JVIobile Workplace


As the above discussion on loss of personal freedom suggests, we all have a great deal
to leam about the social engineering that accompanies the technologies of the network
organization. One issue arises in terms of reasonable working hours. VeriFone expects
employees to be online almost all of the time. Andy Grove, the CEO of Intel, describes
how information technology has made us prisoners of our work: "we"ll be able to
work ourselves to death—^because ubiquitous computers mean that our work will
always be with us. And our competitors will always be working too" [38, p. 70]. A
recent Fortune survey found that U.S. executives predict continuation of a 20-year
trend ofa longer work week [86].
Another set of issues surrounds the societal norms for the use of the technologies.
A reasonable set of emerging norms might include no beepers at the concert,
checking your cellular phones in the cloak rooms of fine restaurants, no mass voice
mailings, and no computer terminals bathing the bed in the glow of highly
unromantic phosphors. But this new electronic highway system, like the vehicular
one that preceded it, requires its own set of signs, markings, regulations, driver's
licenses, courtesies, accidents, police, investigations, lawsuits, courts, and punish-
ments. Today, we are about to emerge from a period that has been not unlike the
early days of manned flight—a few daredevil barnstormers operating in a very
laissez-faire electronic world that until fairly recently has remained out of sight
and out of mind to most of us.
Many other issues remain. For example, sophisticated information filtering mecha-
nisms are needed to manage the maze of data. Much less researched than filtering, but
equally important, are issues related to pricing of information inside and outside the
network organization. There are also interesting issues in taxing the information
traveling from one country to another over global networks.

5. The Role of the Information Systems Executive


ALTHOUGH WE HAVE SPOKEN A GREAT DEAL here about information technology and
a bit less about information management, we have been far quieter about information
managers. Computing and communications technology is expected to become so
pervasive in the dynamic network model that it no longer exists as an identifiable
element distinct from the organizational structures and processes. Such a dissipation
of information technology makes its specialized management, at least at operational
levels, exceedingly difficult. As telephone operators disappeared as a result of auto-
GLOBAL NETWORK ORGANIZATION OF THE FUTILE 53

matic telephone switching technology, information systems specialists will disappear


as operators and controllers of computers and communications technologies. Where
they continue to exist in a custodial role, they will serve a utility role. Such utilities,
which become further and further removed from the applications and users they
support, are very vulnerable to replacement by an external supplier. Relying on
advantages achieved from specialization and economies of scale, the outsourcer will
more efficiently provide IT services.
By the year 2000, Michael Simmons, CIO of Bank of Boston, predicts that
there won't be an IT function in a lot of companies. I believe that the FT function will
be very much like an Alka-Seltzer tablet dropped in a glass. It wiU have gone away
and will exist throughout the organization.... there will be a little room someplace
that takes care of the actual monitoring of the network and those kinds of things, but a
lot of that will be done with expert systems and by people who are netwoik controlleT
types. [88]

In his 1990 Harvard Business Review article. Max Hopper, CIO of American Airlines,
foretells:
As technology reshapes the nature of work and redefines organizational structures, technol-
ogy itself will recede into the strategic background. Eventually—and we are far from this
time—^infomiation systems will be thought of more like electricity or the telephone net-
work than as a decisive source of organizational advantage. In this world, a company trum-
peting the appointment of a new chief infonnation officCT will seem as anachronistic as a
company today naming a new vice president for water and gas. [48, p. 125]

Although the operational IT specialist roles will diminish, we firmly believe a


strategic opportunity will remain for the information management field. The senior
infonnation systems managers can begin to truly impact the form, structure, and
culture of their organizations by focusing on activities where they are well positioned
to add value. Among these are areas where IT's corporatewide perspective and change
management skills give them a unique opportunity. One is in being the spiritual leader,
or at least a co-conspirator, in cultivating the new values, attitudes, and behaviors of
information use and sharing. Another is in providing integrative tools, such as the
corporate organizational memory described previously. A third is active involvement
in reengineering the organization into its new network form. A fourth is educating
organizational members about how they can use information to add context and
perspective to their decision making. A fifth is as a designer of infonnation architecture
and the accompanying corporate highway systems and, more importantly, ofthe social
engineering that must accompany them. As technology becomes more and more
affordable and transferable, it itself becomes less of a differential advantage. However,
the gap between those who know how to implement complex technology and those
who do not seems only to be widening.

6. Conclusion

We have attempted to look into the future. But we fear that all of our experiences in
the present and past limit our ability to conceive the future. We are still trapped in the
54 SIRKKA L. JARVENPAA AND BLAKE IVES

18th-century concepts of organizations. We recently spoke with a senior information


technology executive who works for a leading provider of local telephone service. He
recounted a conversation he had a few weeks before with his city's mayor. As a
commuter, the executive had loudly trumpeted the need for better highway access into
downtown. The mayor's response had brought him up short: "If the things you have
been promising me about the future of communications are true, then the last thing
we should be spending our money on is your proposed new highway." Similarly, in
this paper we refer frequently to designing "the organization" even as we describe a
virtual organization that exists outside of our traditional legal view of an organization.
We tend to think of organizations as organized around functions, products, or markets,
but perhaps the firms of the future will be relatively small entities, organized around
tightly woven core competencies (i.e., centers of excellence).
Predicting the future, though enjoyable, is destined to be ultimately frustrating. If
you get it right, people, in looking back, will be bored by what has now become the
familiar. And, if you get it wrong, you can hope at best to add to the general
amusement. We expect that we will get much of it wrong, but as another predictor of
the knowledge revolution has noted, "The real effects of this second revolution are
almost sure to be different from what we predict, not to mention more interesting—and
momentously large" [34, p. 117].

NOTES
1. Information and conimunication technologies have at least partly lowered the cost and
effort of in terfirm communication and transactions to be largely indistinguishable from intrafirm
transactions [45, 58].
2. Asea Brown Boveri has worldwide operations and a major presence in such segments as
power generation, transmission, and distribution.
3. For another, albeit traditional, illustration of computer support for management by
objectives, see [84].
4. Contrary to the common fear that network organizations have an unstable social fabric,
the electronic network forms so far have been found to enjoy strong social relationships [90].
5. A network externality exists where the per unit information value increases or the per
unit information cost decreases as the user base increases in size and geographical scope.
6. For example, the Privacy Directive of the European Commission seeks to eliminate the
transfer of personal information from one company to another.

REFERENCES
1. Allen, B.R., and Boynton, A.C. Information architecture: in search of efficient flexibility.
MIS Quarterly. 15. 4 (December 1991), 435-445.
2. Bahrami, H. The emerging flexible organization: perspectives from Silicon Valley.
California Management Review (Summer 1992, 33-52).
3. Barlow, J.P. Private life in cyberspace. Communications ofthe ACM. 34.8 (August 1991),
23-25.
4. Bartlett, C.A., and Ghoshal, S. What is a global manager? Harvard Business Review
(September-October 1992), 124-132.
5. Benjamin, R., and Blunt, J. Critical IT issues: the next ten years. Sloan Management
Review (Summer 1992), 7-19.
6. Bessen, J. Riding the marketing information wave. Harvard Business Review (Septem-
ber-October 1993), 150-160.
GLOBAL NETWORK ORGANIZATION C:' THE FUTURE 55

7. Bly, S.A.; Harrison, S.R.; and Irwin,S.Mediaspaces: bringing people together in a video,
audio, and computing environment. C(?m»tMmcan'o«.s<?///ie ACM, J6,1 (January 1993), 28-47.
8. Bowen, D.E., and Lawler, E.E., IH. The empowerment of service workers: what, why,
how, and when. Sloan Management Review. 33. 3 (Spring 1992), 31-39.
9. Broderick, B., and Boudreau, J.W. Human resource management, information technol-
ogy, and the competitive advantage. Academy of Management Executive, 6.2 (1992), 7-17.
10. Business Week. The stateless corporation. May 14, 1990, 98-106.
11. BusinessWeek. Super phones. October 7,1991,138-144.
12. Business Week. Your digital future. September 7, 1992, 56-57?
13. Business Week. The knives come out in Europe's software market. No. 3304 (February
8,1993), 37-38.
14. Business Week. The virtual corporation. No. 3304 (February 8,1993), 99-103.
15. Business Week. Building a wireless future. April 5,1993, 56-60.
16. Business Week. Corporate doctor. September 20, 1993, 66-74.
17. Case, J. The knowledge factory. INC (October 1991), 54-59.
18. Cespedes, F.V., and Smith, H.J. Database marketing: new rules for policy and practice.
Sloan Management Review (Summer 1993), 7-22.
19. Clemons, E.K.; Row, M.C.; and Miller, D.B. Rosenbluth International Alliance: infor-
mation technology and the global virtual corporation. Proceedings ofthe 25 th Hawaii Interna-
tional Conference on Systems Sciences, vol. 4,1992, pp. 678-686.
20. Computerworld. PCs fit suit maker perfectly. December 2, 1992.
21. Davenport, T.H.; Eccles, R.G.; and JVusak, L. Information politics. Sloan Management
Review (Fall 1992), 53-65.
22. Davidow, W.H., and Malone, M.S. The Virtual Corporation. New York: HarperCollins,
1992.
23. Davidow, W.H., and Uttal, B. Total Customer Service: The Ultimate Weapon. New York:
Harper and Row, 1989.
24. Davis, S.M. Future Perfect. Reading, MA: Addison-Wesley, 1987.
25. Davis, S., and Davidson, W. 2020 Vision. New York: Simon and Schuster, 1991.
26. De Meyer, A. Tech talk: how managers are stimulating global R&D communication.
Sloan Management Review (Spring 1991), 49-58.
27. Finholt, T., and SprouU, L.S. Electronic groups at work. Organization Science. 1. 1
(1990), 41-64.
28. Fish, R.S.; Kraut, R.E.; Root, R.W.; and Rice, R.E. Video as a technology for informal
communication. Commumcfltions o/(/ie ACM, .?6,1 (January 1993), 48-61.
29. Forbes. An ultimate zip code. August 31, 1992, 76.
30. Forbes ASAP. Culture of urgency. Technology supplement to Forbes magazine, Septem-
ber 13,1993,25-28.
31. Fortune. The marvels of virtual reality. June 3, 1991, 138-150.
32. Fortune. Phones that will work anywhere. August 24,1991, 100-112.
33. Fortune. The search for the organization of tomorrow. May 18, 1992, 92-98.
34. Fortune. Who's winning the information revolution. November 30,1992,110-117.
35. Fortune. Your new global work force. December 14,1992, 52-66.
36. Fortune. The modular corporation. February 8,1993, 106-108, 112,114-115.
37. Fortune. How we will work in the year 2000. May 17,1993, 38-52.
38. Fortune. The new computer revolution. June 14, 1993, 56-81.
39. Garvin, D.A. Building a leaming organization. Harvard Business Review (July-August
1993), 78-91.
40. Granovetter, M. Economic action and social structure: the problem of embeddedness.
American Journal of Sociology. 91. 3 (November 1985), 481-510.
41. Ghoshal, S., and Bartlett, C. The multinational corporation as an interorganizational
network. Academy of Management Review. 15. 4 (1990), 603-625.
42. Gladstone, J.A. KPMG Peat Marwick: the shadow partner. Harvard Business School,
9-492-002, July 15,1991.
43. Goodhue, D.L.; Kirsch, L.J.; Quillard, J.A.; and Wybo, M.D. Strategic data planning:
lessons from the field. MIS Quarterly. 16.2 (March 1992), 11-34.
44. Grant, R.A., and Higgins, C.A. The impact of computerized performance monitoring on
56 SIRKKA L. JARVENPAA AND BLAKE IVES

service work: testing a causal model. Information Systems Research. 2 (1991), 116-142.
45. Griffith, T.L. Teaching Big Brother to be ateam player: computer monitoring and quality.
Academy ofManagement Executive, 7. 1 (1993), 73-80.
46. Gurbaxani, V., and Whang, S. The impact of information systems on organizations and
markets. Communications of the ACM. 34. 1 (1991), 59-73.
47. Handy, C. Balancing corporate power: a new federalist paper. Harvard Business Review
(November-December 1992), 59-72.
48. Hopper, M.D. Rattling SABRE—^new ways to compete on information. Harvard Busi-
nessReview (May-June 1990), 118-125.
49. Huber, G.P. A theory of the effects of advanced information technologies on organizational
design, intelligence, and decision making. Aca<iew)iq/"Managemen//?evicw, 75,1 (1990),47-7L
50. Ives, B., and Jarvenpaa, S.L. Wiring the stateless corporation: empowering the drivers
and overcoming the barriers. SIM Network (September-October 1991).
51. Ives, B., and Jarvenpaa, S.L. Competing with information: empowering knowledge
networks with information technology. 1993-1994 Annual Review of the Institute of Informa-
tion Studies, a Joint Program of Northen Telecom Inc. and the Aspen Institute, pp. 53—87.
52. Ives, B., and Mason, R.O. Can information technology revitalize your customer service.
Academy of Management Executive, 4. 4 (1990), 52-69.
53. Jarillo, J.C., and Ricart, J.E. Sustaining networks. Interfaces, 17. 5 (September-October
1987), 82-91.
54. Johanson, J., and Mattssson, L. Interorganizational relations in industrial systems: a
network approach compared with the transaction-cost approach. International Studies of
Management and Organizations, 17. \ (1987), 34—48.
55. Kanter, R. When Giants Learn to Dance. New York: Simon and Schuster, 1989.
56. Larsson, R., and Bowen, D.E. Organization and customer: managing design and coordi-
nation of services. Academy of Management Review. 14. 2 (1989), 213-233.
57. Maljers, F.A. Inside Unilever: the evolving transnational company. Harvard Business
Review (September-October 1992), 46-52.
58. Malone, T.W., and Rockart, J.F. Computer, networks and the corporation. Scientific
American (September 1991), 128-136.
59. Mason, R.O. Four ethical issues of the information age. MIS Quarterly. 10. 1 (March
1986), 4-12.
60. MUes, R.E., and Snow, C.C. Organizations: new concepts for new forms. California
Management Review. 28. 3 (Spring 1986), 62-73.
61. Miles, R.E., and Snow, C.C. Causes of failure in network organizations. California
Management Review (Summer 1992), 53-72.
62. Mintzberg, H. Structure in Fives: Designing Ejfective Organizations. Englewood Cliff,
NJ: Prentice-Hall, 1983.
63. Newsweek. Here's a virtual model for America's industrial giants. August 23,1993, 40.
64. New York Times. The age of the hierarchy is over. September 24, 1989.
65. New York Times. Computers give trucker an edge. May 25,1991,17,19.
66. New YorkTimes. Computers that hear and respond. August 14,1991, CI, C5.
67. New York Times. Rethinking the plain old telephone. January 3,1993, section 3, p. 1,6.
68. New York Times. Building the electronic superhighway. January 24,1993, section 3.
69. New York Times. Computer translator phones try to compensate for Babel. January 29,
1993, Al, C13.
70. New York Times. The Unorthodox Behemoth of Law Firms, Business Section 3, March
14, 1993, 1, 6.
71. New YorkTimes. The workplace, after the deluge. September 5,1993, section 3, p. 1, 4.
72. Nonaka, I. The knowledge-creating company. Harvard Business Review (November-
December 1991), 96-104.
73. Ouchi, W.G. Markets, bureaucracies, and clans. Administrative Science Quarterly. 25
(March 1980), 129-141.
74. Palvia, P.C.; Perkins, J.A.; and Zeltmann, S.M. The PRISM systems: a key to organiza-
tional effectiveness at Federal Express Corporation. MIS Quarterly. 16. 3 (September 1992),
277-292.
75. Peters, T. Liberation Management: Necessary Disorganization for the Nanosecond
GLOBAL NETWORK ORGANIZATION OF THE FUTURE 57

Nineties. New York: Alfred A. Knopf, 1992.


76. Pine, B.J., II. Mass Customization: The New Frontier in Business Competition. Boston:
Harvard Business School Press, 1993.
77. Pine, B.J.; Victor, B.; and Boynton, A.C. Making mass customization work. Harvard
Business Review (September-October 1993), 108-119.
78. Porter, M.E. Competition in Global Industries. Boston: Harvard Business School Press,
1986.
79. Prahalad, C , and Hamel, G. The core competency of the corporation. Harvard Business
Review (May-June 1990), 79-91.
80. Quinn, J.B. Intelligent Enterprise: A Knowledge and Service Based Paradigm for
Industry. New York: The Free Press, 1992.
81. Rappaport, A.S., and Halevi, S. The computerless computer company. Harvard Business
Review (July-August 1991), 69-80.
82. Reich, R.R. The Work of Nations. New York: Vintage Books, 1991.
83. Roche, E.M. Managing Information Technology in Multinational Corporations. New
York: Macmillan, 1992.
84. Rodgers, T.J. No excuses management. Harvard Business Review (July-August 1990),
84-98.
85. Rowe, A.J.; Dickel, K.E.; Mason, R.O.; and Snyder, N.H. Strategic Management: A
Methodological Approach. Reading, MA: Addison-Wesley, 1989.
86. Schor, J.B. All work and no play: it doesn't pay. The New York Times, sect. 3 (August
29, 1993), 9.
87. Simons, R., and Bartlett, C. Asea Brown Boweri, HBS Case Study, 9-192-139.
88. Sitkin, I. IS Executive Interview Series: Michael Simmons, Executive Vice-President
Technology and Operations Group, Bank of Boston, Institute of Infonnation Studies, 1992.
89. Snell, S. A. Control theory in strategic human resource management: the mediating effect
o{iLdtmnistTSLti\emfoima\ion.Academy of Management Journal. 35, 2 (1992), 292-327.
90. SprouU, L., and Kiesler, S. Computers, networks and work. Scientific American (Sep-
tember 1991), 116-123.
91. Stalk, G.; Evans, P.; and Shulman, L.E. Competing on capabilities: the new rules of
corporate strategy. Harvard Business Review (March-April 1992), 57-69.
92. Straub, D.W., and Collins, R.W. Key information Hability issues facing managers:
software privacy, proprietary databases, and individual rights to privacy. MIS Quarterly. 14. 2
(June 1990), 143-156.
93. Vanderbroeck, P. Long-term human resource development in multinational organiza-
tions. Sloan Management Review (Fall 1992), 95-99.
94. Wagner, H.E. The open corporation. California Management Review. 33. 4 (Summer
1991), 46-60.
95. WiUces, M.V. Revising computer security in the business world. Communications ofthe
ACM. 34, 8 (August 1991), 19-21.
96. Wired. Libraries without walls for books without pages. 62-65, 110.
97. Wriston, W.B. The Twilight of Sovereignty: How the Irrformation Revolution is Trans-
forming Our World. New York: Charles Scribner's Sons, 1992.

You might also like