Date post: | 05-Apr-2018 |
Category: |
Documents |
Upload: | claude-rochet |
View: | 219 times |
Download: | 0 times |
of 25
7/31/2019 ISSubAgt
1/25
Using information system as a legitimate subversive agent
Using information system as a legitimate subversive agent
THE CASE OF THE MONITORING OF FRENCH
SCIENTIFIC RESEARCH
Claude Rochet
Professor in Public Management
Johanna Habib
Assistant professor in Public Management
Institut de Management Public
Universit Paul Czanne
Aix en Provence
- Page 1/25 -
UNIVERSITE DE DROIT, D'ECONOMIE ET
DES SCIENCES D'AIX MARSEILLE
UNIVERSITE PAUL CEZANNE
Institut de management public et de gouvernance
territoriale
http://www.managementpublic.u-3mrs.fr/
CENTRE DETUDES ET DE RECHERCHE
SUR LES ORGANISATIONS ET LA GESTION
QuickTime et und compresseur TIFF (non co
sont requis pour visionner c
http://www.managementpublic.u-3mrs.fr/http://www.managementpublic.u-3mrs.fr/7/31/2019 ISSubAgt
2/25
Using information system as a legitimate subversive agent
Abstract : The new budgetary framework to be implemented since 2006 onwards in the
management by results French budgeting system implies a profound reengineering of the
relationships between central administration and autonomous agencies in charge of
implementing the policy. We study the case of the French research policy which is carried out
through a network of 160 universities and 40 specialized scientific agencies, all of them
enjoying a statutory autonomy. Information systems are the key to align processes from the
fields operators to the central objectives of the public policy. A new design is needed requiring
an approach we call urbanization, that is thinking the global architecture as a relevant city
map instead of the spaghetti networks inherited from the legacy system. Managing such a
project is, whereas speaking about technological issues, raising strategic questions about the
new relations between the centre and the periphery and implies partly solving the dilemma
between local strategic autonomy and the central impetus the state must give to enforce the
political objectives of the government. First regarding centre-periphery theory and IT strategic
planning approach, we explain why information systems are a critical issue in the centre-
periphery relationships. Secondly we analyze how the IS reengineering may be an enabler of
the strategic dialogue between the central administration and autonomous agencies. Thirdly, we
draw on the difficulties we met with to design the new capabilities to be improved and we
conclude on the paradigm shift required in the public management concepts.
Keywords: Information System, French research Policy, centre-periphery dilemma,
qualitative research methodology
- Page 2/25 -
7/31/2019 ISSubAgt
3/25
Using information system as a legitimate subversive agent
In his seminal research on how information technologies (IT) create value, Prof. Eryk
Brynjolfsson (2002), director of the MITeBusiness research centre, put emphasis on the fact
that what really accounts for is the hidden face of the iceberg. Pure technology accounts only
for 10%, technological complements (the art of architecting heterogeneous and complementary
technologies) for another 15%. The remaining 75% of value creation comes from the renewal of
the organization triggered by information system (IS) implementation. Brynjolfsson carried out
this research among private companies in the US and we have no similar inquiry among public
actors that would assess a similar rule of the game. Nevertheless, in the state of our knowledge,
nothing forbid us to assume this is also valid for public sector.
In the public sector, ITs policies have been coined with the New Public Management
(NPM) approach that means: Business Process Management (BPM), outsourcing, customer
oriented service, downsizing and saving money. The underlying assumption is to focus on the
front office to improve performance as a customer provider relationship and to outsource the
back office. This framework mainly bears a conception of technology as an exogenous change
agent and its expectations have not been met (Dunleavy and Margetts, 2003). On the contrary, a
growing literature considers IT in a Schumpeterian way, as an endogenous lever of change
operated by entrepreneurs (Freeman, 2003).
In this paper, we will consider how IT may act as a legitimate subversive agent.
Managers mainly consider the visible part of the IT iceberg and do not consider how designingand implementing an information system is to induce a sea change within the organization.
Moreover, they frequently consider that implementing ITs will avoid raising some fundamental
questions about an organization strategy, business and processes. An IT project may be an
opportunity to raise the uncomfortable questions (thats why they are subversive) but
incontrovertible (thats why they are legitimate).
We attempt to answer to the following questions:
Is designing and implementing an integrated Information System a relevant
enabler of the strategic dialogue between the centre and the periphery? In other words,
could an integrated IS help moving the centre periphery dialogue towards a new
configuration of cooperation and interdependence ?
Firstly, with the help of the centre-periphery theory and IT strategic planning approach,
we explain why information systems are a critical issue in the centre periphery relationships asan enabler of the strategic dialogue between the central administration and autonomous
- Page 3/25 -
7/31/2019 ISSubAgt
4/25
Using information system as a legitimate subversive agent
agencies. Secondly, we analyze how this dialogue raises subversive questions that need political
statements and reengineering decisions. Thirdly, we draw on the difficulties we met with to
design the new capabilities to be improved and, fourthly, we conclude on the paradigm shift
required in the public management concepts and on the new role of the CIO in public
management.
THE CENTRE - PERIPHERY DILEMMA
The centre-periphery model provides a relevant framework to analyze the relations between a
public policy and the agencies in charge of its implementation, or in other words, the different
games and strategies of actors in a political system (Eisenstadt, 1987, Crozier and Thoenig,
1975, Bendix, 1968).The centre-periphery model, located within the dependency theory (i.e Luxemburg,
1904), had been originally developed to describe the relationships and links of interdependence
between the third world countries and the so-called western countries. But, it is also a general
comprehensive and systemic theory of exchange processes of resources in social systems
(Wallerstein, 1974). The social organizations are grasped as hierarchical structures comprising a
centre and a periphery. The centre-periphery relationship reflects mechanisms of domination,
influence and dependency and allows understanding the autonomy strategies of local structures.
In the specific case of the French public policy research, by the time being the centre-periphery
dialogue is a relation both of influence and dependency.
Influence because the local agencies produce knowledge and deliverables that in
return legitimate the central action.
Dependency because the major decisions are taken by the centre which holds the
main resources.
The central administration has interest to fully control the local decisions and behaviours, but, conversely, the local agencies have interest to fully preserve their autonomy power as a
defence against the central bureaucracy (Thoenig, 1982). In other words, the centre-periphery
dilemma shows a process under pressure and the complexity of social organized system. In the
French research system, the centre-periphery model reveals both a localization of central policy
and a nationalization of local policy. Besides, a paradox appears with the role of locales
structures in this organization. They are a motor of initiatives and innovations (which is
essential to revitalize the central power) as well as a place of resistance to change when the
- Page 4/25 -
7/31/2019 ISSubAgt
5/25
Using information system as a legitimate subversive agent
directives come from a central view. This observation popped up the following question: Does
an ideal distribution of power exist to implement a public policy ?
The last French autonomy movements postulated, contrary to the weberian theory, that
the local authorities should be involved in the definition of the central public policy. It is
necessary, however, to distinguish the operational autonomy from the strategic autonomy. The
operational autonomy, characterized by a central intervention at micro and macro level, was
until recently the official French research systems management method. By the time being, and
because of budgetary constraints and attempts to measure performance, a new configuration
seems to emerge. Moreover, the newly elected Sarkozys government is committed to give
autonomy to universities. Local agencies such as universities exchange directly with diverse
actors of their environment to obtain resources, design their own strategic plans, and claim for
their strategic autonomy. The strategic autonomy to be efficient requires a strong and
enterprising central government at the macro level in order to link the scientific production with
large strategic orientations. Nowadays, the move from bureaucratic centralism to strategic
centralism is not achieved. This problematic of centre is a controversial issue (Rochet, 2007,
Chevalier and Rouban, 2003). The public policy performance relies on the centre strategic
capacities and on the mobilisation and coordination of local agencies. Implementing an
effective public policy requires a new configuration of the centre-periphery dialogue based on
adaptive learning of their interdependencies. This research assumes that the IS can be thefoundation of the centre-periphery strategic dialogue and thus, that IS could be a strategic
instrument to pilot the research policy.
I.S AS TOOL AND PLACE OF THE CENTRE-PERIPHERY STRATEGIC
DIALOGUE
If the strategic dimension of integrated I.S is broadly accepted in the literature, the
studies field experiment is more mixed (i.e Davenport, 1998, Botta-Genoulaz and Millet,
2006). Most of the failures can be explained by a lack of IT competencies, problems of
cooperation between units and actors, resistances to change, and more generally absence of
clear strategic objectives (Stefanou, 2000; Themistocleous and al, 2001).
Baumard and Benvenuti (1998) shows that the strategic rooting of IS depends on the IT
alignment with the specific strategy pursued. In others words, integrated IS must develop a
synergy between strategic objectives and IT architecture to be effective. This is why designing
an IS requires rethinking the business processes, the structure relations, the activities, etc. and
- Page 5/25 -
7/31/2019 ISSubAgt
6/25
Using information system as a legitimate subversive agent
finally imposes in depth changes. IS, as a lever of performance, cannot avoid theses reflections.
IS strategic management, by assigning objectives to purchase policy and general organization of
means, builds the framework to develop and implement future projects, business or activities.
Several authors had connected IS with the concept of collective learning (Amabile and Gadille,
2006) which constitutes a prerequisite to reinforce cooperation between actors and
organizational structures. IS implementation refers also to the reflections on the process of
strategic decisions making and information exchange (Reix, 1998).
For these reasons, we assume that the implementation of an integrated IS is a relevant
instrument to create new configurations of cooperation between central administration and local
agencies. The main issues of centre-periphery dilemma are focused on the questions of the
interoperability and of the sharing of strategic information. Organization, socialization andinfluence processes predetermine the relations of cooperation between centre-periphery and
may produce an unequal and inconsistent collaboration among the actors. IS design is thus a
relevant occasion to build a new framework to foster this centre-periphery cooperation. This
concept can be defined as the interdependence links and stability degree of relationship
(Amabile, 1999). This exceeds, by far, transactional interdependence and means rather a
pooling of resources, information and knowledge. The role of the central administration in this
IS design appears to be crucial to coordinate actions of local agencies and to create strategic
interdependencies. Successful implementation of IT architecture relies on strategic centralism
that enables the development of relational networks between local structures and central
administration, and promotes their mutual adjustments and interactions within their dynamic
and competitive environments.
IT architecture definition varies with authors in the literature. sterl and al (1993) try to
define IT architecture includes the following components : strategies and objectives, business
processes, organizational units or structures, external agents, geographic localizations, kinds
and attributes of entities, relations between entities, IT applications, information flows and
database. These components are connected through different combinations, i.e entity X is
involved in process Y and mobilizes application Z (Reix, 1998). A global IT architecture is
designing a coherent system based on components association. For instance: organizational
view, operational view, data view, information view, security view, IT view, etc. The concept of
IT architecture finally reflected the global system monitoring through the harmonization of
different policies. Therefore, IT architecture appears to be a vector of performance and
- Page 6/25 -
7/31/2019 ISSubAgt
7/25
Using information system as a legitimate subversive agent
efficiency as well as a complex and perilous project. The case study presented below in this
paper intends to illustrate this dualism.
IT ARCHITECTURE IMPLEMENTATION AND ORGANIZATIONAL
CHANGE : FOUR STAGES TO DEVELOP IT ARCHITECTURE
COMPETENCY
Building IT architecture to monitor the French research activities is a sea change. It
implies major transformations in organizational processes and configurations of cooperation
between central and local structures.
When speaking about public policy, change seems to be an emergent and dynamic
process and involves a discussion about systems present and future IT capabilities, a Double
Loop Learning (Argyris and Schn, 1978).
Usually IT Architecture implementations fail because of putting emphasis on the current
core business rather than on the opportunities to create new processes and businesses. As a
matter of fact, most of organizations build their IT architecture as a set of isolated applications
and decisions to respond to specific process needs (Broadbent and Weill, 1997). In order to
avoid the tricky questions, actors put aside the strategic context, the organizational view and
need of IT architecture, the business process articulation with IT solutions and, finally build
an IT architecture without thinking in new capabilities and required competencies.
According to Roos (2003), the creation of a strategic IT architecture competency, defined
as a learning process, evolve in four stages: 1) an application silo architecture, 2) a standardized
technology architecture, 3) a rationalized data architecture and 4) a modular architecture.
In the following figure, we can observe the four stages learning process of the IT
architecture competency development.
Figure 1: Changing Resource Allocations Across Architecture Stages
- Page 7/25 -
7/31/2019 ISSubAgt
8/25
Using information system as a legitimate subversive agent
Source : Roos (2003), Center for Information Systems Research, MIT Sloan School of
Management
The application silo architecture consists of architectures of individual applications
rather than an architecture for entire enterprise (Roos, 2003, p.5). In this first stage, IT
applications are developed to address specific business needs and are limited to a single
functional system or unit. Yet, the many independent applications based on various technologies
and data make information transactions difficult. It is a stage of local optimization.
The standardized technology architecture relies on the implementation of technology
policies and standards, and on the development of a shared infrastructure. The aim is to limit the
number of platforms to manage and to introduce data warehouses in order to make easier the
transactions between the different units of organizational system. The standardization and
interoperability efforts participate in IT efficiency (especially by reducing IT cost and
complexity). This stage increases also IT reliability and security. Yet, implementation of
standardized architecture can collide many operators resistance: to the standards principle, to
the top down approach needed to develop restrained IT applications, to the data sharing
The rationalized data architecture is made of the core processes and activities definition
(Core Processes Integration) and the common and centralized database implementation. In
this stage, IT architecture is aligned to strategic business by standardization processes that
ensure the IT infrastructures relevance and the data stores quality. As long as the data is
reliable, core process activities become predictable (Roos, 2003:9). Implementing a
rationalized architecture can allow optimizing the core processes and improving business
performance. But, this process needs a negotiation with local operators to obtain clear and
accepted definition for each core process, to make explicit the data these activities rely on, and
to determine the share proceedings. In other words, identifying and defining the core processes
require a strategic dialogue between the central approach and the various views of local units.
- Page 8/25 -
7/31/2019 ISSubAgt
9/25
Using information system as a legitimate subversive agent
Besides, this strategic dialogue needs the lead of a strong central organization. This kind of
architecture includes some limits. First, the processes standardization sets a rigid infrastructure.
So, a change in the business is clearly difficult and this doesnt encourage radical innovation.
Second, the optimization (or just management) of core processes depends nearly entirely on the
quality of collected and shared data. Finally, the rationalized architecture is the most top-down
approach of the four stages. And it is both necessary to define a relevant management change
and to communicate on the stakes of rationalized architecture in order to limit the resistances of
local operators.
The last stage,modular architecture , enables strategic flexibility through customized or
reusable modules. These modules extend the core processes, which have been wired into the
infrastructure during the rationalized data stage. (Roos, 2003:11). The modularity within IT
architecture allows system flexibility and local autonomy to be reinforced. This stage manifests
itself by the opportunity given to local units to select the modules that they need and to create
new process support system. Thus, local units IT strategies permit to experiment the use of
new modules and anticipate the needs and opportunities for organization-wide. This local
customization combine with standardized core processes can develop the capability to identify
strategic opportunities and to innovate. However, in order to support this local flexibility,
modular architecture requires distinguishing the processes with only one standard from the
processes with multiple standards. Though the modularity is difficult to implement, it seemsespecially relevant when core business strategy depend on changing environments. The
customized and reusable modules provide greater efficiency in combining the standardization
advantages of third stage with the innovativeness of application silo stage.
Figure 2 shows the key IT characteristic for the four stages governance.
- Page 9/25 -
7/31/2019 ISSubAgt
10/25
Using information system as a legitimate subversive agent
Figure 2 : Key IT Governance and Management Mechanisms
Source : Roos (2003), Center for Information Systems Research, MIT Sloan School of
Management
Each architecture provides different IT capabilities and relationships between central and
local units. Change across these four architectures stages is only possible when the learning process of previous stage is achieved.
The rationalized architecture implementation seems particularly relevant in the current
context of French Scientific Research performance measure. In such architecture, central
government publishes the large strategic orientations by identifying, together with the local
operators, the core processes. Meanwhile, local agencies adapt the central strategy and produce
the research outputs. Moreover, the future change towards the fourth stage (modular
architecture) can allow reinforcing the strategic autonomy of local agencies and to stop the
central intervention at the micro-level. Yet, this architecture designing requires the stages 1 and
2 having been carried out by operators. Besides, the change to third stage implies the
development of Technological Absorptive Capability (Cohen and Levinthal, 1990).
Absorptive capacity is an organizations ability to identify, assimilate and exploit knowledge
from the environment. In our case, absorptive capability focuses on the effectiveness of
technological knowledge assimilation.
- Page 10/25 -
7/31/2019 ISSubAgt
11/25
Using information system as a legitimate subversive agent
But some questions remain: How to organize the centre-periphery strategic dialogue to
develop IT architecture competency? How to monitor the implementation of IT architecture
competencies ? How to evaluate the IT stage of operators ? And finally, where are the efforts to
be focused on to implement a rationalized architecture in the French public research system?
RESEARCH METHODOLOGY AND DATA COLLECTION
The literature highlights that the design and implementation of an integrated Information
System is clearly identified as a vector of change due to the fact that IS allows developing a
new relation configuration between the centre and the periphery. But, being a sea change, it is
also a source of complexity
We try to assess these paradoxical interactions through a case study methodology(Eisenhardt, 1989, Yin, 1990) based on the study of French scientific research policy
monitoring. This case study allows us to examine the role of IS in the strategic dialogue
development between the centre and the periphery as well as the difficulties in designing new
architectures and capabilities regarding the research system. A qualitative investigation had
been chosen (Miles et Huberman, 1984) based on a single-case study. This methodological
choice is justified and relevant when the case presents a unique and original characteristic and
allows testing and completing an existing theory (Yin, 1990).
The monitoring system project of French public research is a relevant field because it
provides an exhaustive collection of data. Besides, this methodology proposes an original
intervention Research (in the view of Lewin, 1951), based on a researcher and practitioner
binomial. The practitioner was the Head of the monitoring system conception project and as
such he wore two hats: he was both expert and researcher. The second author assumed a role of
guide notably in the data collection and analysis. The practitioners personal experience allowed
him to develop a true sector-based expertise (Wacheux, 1996) and an extensive understanding
of the project situation and context. In addition, his strategic and steady participation allowed to
meet and exchange with a multitude of actors having different responsibilities and to develop
relations of trust favourable to information collection. The aim of an intervention approach is to
build an in-depth understanding of how the system works and produces knowledge (Hatchuel,
1994; David, 2000) through a hybrid exploratory logic (Allard-Poesi and al, 1999), where
abduction has an important role to play especially regarding the analytic phase.
However, an intervention research required a delicate data collection to control the data
authenticity. The case study had been designed using a combination of different collection
- Page 11/25 -
7/31/2019 ISSubAgt
12/25
Using information system as a legitimate subversive agent
methods. First, the collection of primary data includes both centred interviews (20 interviews
about one hour for each) with the practitioner in charge of project and notes of participant
observations collected by the practitioner. And second, we organized a collection of secondary
data (Weick, 1993) through a set of internal and strategic documents explaining the project
stakes, its implementation, the actors, etc. This collection provides a data triangulation and a
robust chain of evidence (Miles et Huberman, 1984). The data analysis had been a qualitative
one through a thematic content analysis (Bardin, 2001) and had been achieved with the
assistance of Nvivo (qualitative data analysis software), organizing the verbatim in categories of
themes and under-themes.
THE CONTEXT OF FRENCH SCIENTIFIC RESEARCH MONITORING
Since January 1st 2006, the French state administration is expected to work under a new
budgetary framework, the LOLF1, which is doomed to implement management by results.
Budget is voted by missions defining a public policy, split in ministerial programmes, each of
those being accompanied, when voted, by a set of results indicators, the annual performance
plan, (PAP) and a corresponding annual performance report (RAP) when rendering the accounts
before the voting of N+2 year budget.
The biggest mission (up to 20 billions euros) deals with scientific research and
universities. France has 105 universities and professional schools, and about 40 research
organisms such as CNRS, INSERM, INRA, Institut Pasteur among the most notorious ones.
Each of these operators enjoys a statutory autonomy, with full administrative machinery (board,
budget research and academic policy), in spite most of their budget comes from the ministry
for education and research. In terms of public expenses, this perimeter represents about 22
billions euros that are completed by private funding through research contracts. The global
amount is far below the critical GDP 3% target required to maintain Frances leadership in its
traditional fields of excellence (such as mathematics and physics) and to win a rank in the new
research fields (such as ITs) and high-level teaching.
The landscape where this reform takes place is quite fearful:
A new legal framework for public research is being implemented concurrently
with the LOLF agenda. A program agency has been set up to fund research
projects presented by operators, whether public or private, based on a global
public research agenda defined by a scientific committee close to the President.1 Loi Organique sur les Lois de Finances (LOLF) , a constitutional law that defines the way the state budget is to be voted and
how ministries must be accountable towards the parliament.
- Page 12/25 -
7/31/2019 ISSubAgt
13/25
Using information system as a legitimate subversive agent
Simultaneously, a new evaluation agency is to be set up as an independent body
in charge of evaluating universities and other organisms, both in research and in
teaching activities. A leftist movement, Sauvons la recherche is accusing the
government to subject research orientations to the short-term interests of private
firms.
The worldwide French universities ranking is worsening year after year
according to the Shanghais ranking, as well as the French research ranking in
the SCI2 partly due to the rise of Chinese publications.
Such a reform hits the structure of the ministry for education and research (the
fourth bureaucracy in the world with 1,4 million agents), which has a
notoriously poor ability and legitimacy in monitoring research activities and indefining a clear strategic intent.
Students demonstrations in spring 2006 against a reform of the labour law haveundermined the government authority among academic authorities.
During the last five years, most universities and research organisms have heavily
invested in their information systems. According to the principle of autonomy and due to the
lack of a unified strategy at the state level and steered by the ministry, each agency and
university has built his information system on its own, without any regard to common standards
and interoperability as much as for data as for technologies.
When the LOLF process was launched in 2001, the case of autonomous bodies and their
relations with their parent ministry has not been considered (Rochet, 2004). On a strict legal
basis, they are not concerned by the LOLF since they are not accountable towards the
parliament for they receive public funds indirectly through their parent ministries. However,
practically they are, both as operator of a public policy and regarding a global trend in public
machinery that makes agencies becoming accountable toward the parliament thought hearings,inquiries, reports of the Court of accounts, and others direct relationships with members of the
parliament and citizens (Rochet, 2002).
Likewise, few people in the high level of the public machinery realized that the real
strategic perimeter of a public policy is not a programs budget of a ministry but a virtual
perimeter involving many actors, public and private. For instance, when the government wants
to know how much the nation spends on fighting cancer, it is not sufficient to consider the
INSERM (the agency in charge of medical research) expenses on the issue, but he needs to2 Science Citation Index, a worldwide index of scientific publications only in the hard sciences ranked by their citations.
- Page 13/25 -
7/31/2019 ISSubAgt
14/25
Using information system as a legitimate subversive agent
connect data coming from many heterogeneous actors fighting on different fields such as
information, prevention, hospital, research, and rehabilitation. These activities belong to many
public bodies, non-profit and private actors, using heterogeneous data and information systems
that make it difficult to consolidate.
It becomes obvious that if the government wants to take up seriously the challenge of
evaluating public policies and to be accountable to the parliament for the public expenses and
for how a public policy has been achieved according to the three LOLF criteria (process
efficiency, service delivery and socio-economic effectiveness), he must consider information
system design and architecture as a key issue.
I.S AS A LEGITIMATE SUBVERSIVE AGENT
To render accounts towards the parliament, there are two options: One is to build huge
statistics scaffolds (the first LOLF report has presented more than 1500 result indicators to the
Parliament in 2007!) that will allow two things: satisfying with the requirements to produce
quantified results and going on business as usual in the day to day administrative business. This
is easy to realize and does not threat the bureaucracies vested interests. The other option is to
build a fully integrated monitoring system that would collect data within operators information
systems to be consolidated in a central balanced scorecard.
Complying with the requirements of the second option raises two big issues:
1) HOW to do it? Implementing a fully integrated monitoring system doesnt fit with the
dominant rationale of the so-called weberian bureaucracy and requires designing a new kind
of relationships between the centre and the periphery, no longer based on a command and
control management (Rochet, 2004) but on strategic monitoring, shared objectives, operators
empowerment, clear accountability in a climate of trust. Not only is this a cultural sea change
but that also requires new capabilities in using information technologies that are not, by the time
being, mastered by the managers in charge.
2) But the main issue is WHY should this change set in motion? Roles need to be
redefined and many vested interests are under threat. If nobody objects the political legitimacy
of the centre to monitor the system, its practical legitimacy is to be established. Why should the
operators open their information systems to the parent ministry? All of them agree with the
need to share data and to integrate their systems but mainly on a cooperative and horizontal
basis that does not induce any control from one over others. The issue is different when it is to
share data with the ministry. By the time being, without any global IS, when the ministry wants
- Page 14/25 -
7/31/2019 ISSubAgt
15/25
Using information system as a legitimate subversive agent
to get information from autonomous operators, it proceeds by sending questionnaires that are
filled in on a declarative basis. In other words, each autonomous operators declares 1) what he
knows, depending on its own IS, data format, IT standards, accounting systems, and 2) what
he wants to tell the ministry according to its own strategy and the supposed hidden strategy he
attributes to the ministerial administration.
Nevertheless, there is a wide consensus among all actors to acknowledge that making IS
interoperable is an issue that implies:
Common tools and software
Common standards to make legacy systems fully interoperable
Assessing, with evident fears, the performance of universities and research
organisms in a context of tough international competition shed by the badranking of France in the Shanghais index and the new obligation to be
accountable to the parliament.
Intending to implement an IS raises at each step subversive questions. By subversive, we
mean the questions that the present consensus prudently avoids raising so as to preserve a
fragile institutional equilibrium. These questions are the result of the need to clarify and to
design business processes or of the mere necessity of making presently hidden information
explicit. We may classify these questions as follows:1) Worrisome questions:
I share my data, but how will the system use it? Being independent with heterogeneous
IS has an obvious advantage: not being accountable!
I share my data, I know what I lost, and I dont know what I win . Laboratories and
research centres are generally eager to share data so long only scientific issues are at stake. It is
another issue to give information that would be used by the centre to monitor (and to gain
control over labs activities.As an example, an attempt to build a monitoring system based on a fully compatible IS
and data warehouse at Science of IT Dept in the CNRS made appearing that:- A researcher has no more publications than a professor researcher in anuniversity3;- Raising the number of administrative staff does not increase researchers productivity, so as- Increasing the number of researchers and doctoral students in a labdoesnt increase its efficiency.
3 A researcher in a research organism has no teaching tasks, whereas a university professor is supposed to dedicate 50% of his
time to both research and teaching.
- Page 15/25 -
7/31/2019 ISSubAgt
16/25
Using information system as a legitimate subversive agent
- The bigger the research team, the lower its results.To put it bluntly, it seems there is a Brookss law4 in the structuring of research
organizations: raising resources and staff decreases efficiency, efforts must focus on
architecture and networks of process and there is an optimum efficient size a time must not
excess.
2) Paradoxical demands
In the absence of central monitoring IT architecture, whether at the state or the
universities level, the IT community came into organize on its own way akin to the free
software developers community. A reduced number of big applications does exist at the central
level (finances, HR, students) but the current management applications are chosen, and
frequently developed, on a local criteria basis. A group of 34 universities (among 105) have
developed a shared application that is ade facto ERP5: a common data warehouse and a set of
businesses applications, named cocktail. There is a clear claim from within the community
for common standards and tools that calls for a central architect that could only be the central
university mutualising agency. But what the IT people demand is only for the agency to act as a
free software service centre and not as an agency monitoring a global IT policy that would
threat their independence. However, when the centre is asked to support bottom-up approaches
and developments, it cant only act as a technical agent: its mandatory role is to validate
architectures and, at the time being, it is not a business he masters, whether technically or politically.
3) Highly politically sensitive questions:
Designing IT architecture requires first defining the basic objects that will be its building
blocks. Questions that seem at a first glance quite mundane appear in reality to be sensitive, for
examples:
How to account students? There is a difference in the number of registered students and
this of students really attending classes. The difference may be, in some region, illegalimmigrants.
How to define a research unit? Apart from the general trend of the raising part of
Chinese publications, the bad ranking of France universities in Shanghais ranking is a problem
of information system. There is no common description and identifier of a research unit and
4 The Brooks law has been formulated par Fred Brooks, the conceiver of the IBM 360, in his seminal book, The Mythical man
Month: Adding resource to a late project makes it later because these new resources disrupt its architecture.5 Enterprise Resources Planning: software built around a common data warehouse and standard state of the art business
processes. Their implementation requires an important organizational redesign to fit this process that is currently weighed as 90
% of the project costs.
- Page 16/25 -
7/31/2019 ISSubAgt
17/25
Using information system as a legitimate subversive agent
thus of its related publications. University Lyon I publishes under 41 different identities! This
haunting problem is well known, but reaching a shared definition and a common identifier
needs building a consensus among universities, which each built arrangements of their own.
Who and on which criteria will accredit research units and define and maintain a common
identifier, avoiding each research project staffs to define their own, making the global
organization fuzzy and unaccountable?
DESIGNING NEW ARCHITECTURES AND CAPABILITIES
Such a large project is a complex project such as defined by Miller and Lessard (2001):
unique, complex, irreversible and instable. This kind of project is not doomed to fail because of
its technical difficulties but of its turbulent institutional environment. It will experiencedifficulties not so much because engineers cannot cope with technical complications although
IT projects unfold in a rapidly evolving technological environment but much more because of
the managerial abilities of projects sponsor in coping with unforeseen turbulence. This
turbulence originates from two sources: exogenous events such as changes in the political
orientations of the research policy or the bankruptcy of a technological partner, and endogenous
events such as internal contradictions or needs for evolution the project reveals. According to
Miller and Lessard, turbulence is negatively connected with project performance.
The basic laws of complexity tell us that a big complex project may not be merely the
sum of decentralized actors projects. It is a meta-system emerging from actors interactions,
but which needs central governance that will model its global complexity, both endogenous and
exogenous. Setting up a project governance is an architect job which is twofold: designing an
institutional framework that enables arrangements between stakeholders and, once set up, the
practical job of foreseeing risk management, building a global vision and arbitrating between
different options.
As long as this governance is not installed, the project will be endangered by unforeseen
risks, subversive questions, institutional psychodrama, caprices and tough arbitrations one actor
has not interest to give when seen from its sole proper interest. The role of the centre is to build
this holistic system in which technology, policy and finance interact. Decentralized actors may
legitimately fear that this would lead to more centralization, something akin to aGosplan . It is
obvious this is a risk in the eye of the dominant so-called weberian ministerial administrative
framework. Avoiding theGosplan trap will require the project to fulfil three generic conditions
(Miller and Lessard, 2001):
- Page 17/25 -
7/31/2019 ISSubAgt
18/25
Using information system as a legitimate subversive agent
Stabilizing the long future to enable investments of each stakeholder: In our case,
this project horizon is not less than five years so as to be able to monitor effectively the public
research. Although it increases the environmental complexity, the major changes in the legal
public research framework are a guarantee that the project is not a politician caprice that will
change with the next government. On another hand, a long-term project cannot wait for five
years to produce its first results. Confidence and commitment among stakeholders will be built
both by formulating a long-term vision and by quick wins.
Flexibility to face turbulence : Once agreements negotiated and commitments made, the
centre will have to manage risks, whether foreseen or unforeseeable. A modular project
architecture, where the project is a program split in an arborescence of projects ran by
stakeholders, is likely to enforce the capacity to face turbulence.
Enhancing the legitimacy of the project: This project, as seen above, faces opposition
from vested interests. Although weak at the beginning, this opposition may rise when
subversive questions arise and threat those interests. Answering these questions needs new
institutional arrangements, trade-offs through confrontations and public debates. A successful
sponsor wont start a project until its legitimacy is no longer challenged, and will remain
prepared to permanently rebuild this legitimacy when facing risks and challenges that will
undermine it.
Fulfilling with these requirements implies eliminating theGosplan option to prefer agovernance architecture where the roles and responsibilities both of the centre and periphery are
clearly defined and that combines bottom-up and top-down approaches. In our case, we intend
to adopt the following arrangement:
Instead of a plethora of steering committees with excessive non-decisional members, a
central directorate is set up around the central ministerial function entitled to make and enforce
decisions, including representatives of universities and research organisms.
This governance directorate will have to deal only with strategic issues and will be preserved from being overwhelmed by technical issues that will be delegated to a project
management staff close to him. These strategic topics were listed as follows:
Funding and budgeting: who will pay for what? What is to be charged to universities
and other research bodies, what is to be funded by the ministerial budget?
What are the decisions to be made at this level? For instance, only decisions with an
impact over X millions euros will come to this committee.
- Page 18/25 -
7/31/2019 ISSubAgt
19/25
Using information system as a legitimate subversive agent
Validating the global architecture of the missions IS : data, interchange standards,
systems interoperability, business processes, quality standards are key norms since each actor
is autonomous. Whatever the technology he chooses, interoperability must be compulsory.
The large shared processes and their owners : a meta-system being more than the sum
of the sub-systems, it needs specific processes. Some may be central monitoring, other may be
shared process among universities or research actors, such as data warehouses and production
of indicators. A global architecture will be based on common building blocks: assigning the
conception and the ownership of these blocks to peripheral players will reinforce the ownership
and trust in the global system.
Outsourcing rules and relationships with IT providers : The NPM fashion has fostered
the idea that the best for public administration was to outsource IS to private providers. This as
resulted in a loss of control over the system, a loss in reliability and a raise in costs (Dunleavy
and Margetts, 2002). In a decentralized system where players will deal directly with providers,
there is a need for common procurement rules and practices, and, most of all, a need for
defining the strategic capabilities not to be outsourced and to be enforced by the centre. This
implies the definition of strategic capacities to be shared among all actors, particularly the
centers capacity to act as an architect.
Scenarizing and managing risk : Stakeholders must not rely on technology but on the
resilience of the architecture to exogenous as well endogenous risks.Alongside this strategic governance committee, a project management committee deals
with technical issues: evaluating and costing the projects, managing budgets and planning,
negotiating with providers and insuring quality and reliability.
ARCHITECTING THE ORGANIZATION AND THE IS
Designing the architecture of the new monitoring arrangement resulted in designing a
new layer between the centre and the peripheral agencies (fig 3)
Figure 3 : Layers of governance to measure the French scientific research
performance
- Page 19/25 -
7/31/2019 ISSubAgt
20/25
Using information system as a legitimate subversive agent
juillet 07 10
I: Strategic orientations, financial framework (National,EU, regions )
II: Programming = scientific agencies management,
contract with universities: defining the demand
III: Execution = agencies and universities productionfunction: defining an offer and producing deliverables
Layer I is that of the national research policy formulated whether by law or budgetary
orientations by the state, research programmes of the European Union i.e funded by the
member state - and of regions through incentives given to creation of clusters.
Layel II is a new programming function to be set up. It is represented by the scientificmanagement of agencies and the process of setting up contract based links between the state,
universities and research agencies.
Layel III is a classical production function that produces deliverables according to the
orientations set up at level I and II.
In terms of information systems, this arrangement may be represented as follows:
- Page 20/25 -
7/31/2019 ISSubAgt
21/25
Using information system as a legitimate subversive agent
Figure 4: Information system governance layers
juillet 07 14
Technical infrastructure
Software architecture
Business process architecture
Monitoring systemI
II
III
Urbanizationconstraints
Level I is the global monitoring system, i.e the balanced scorecard of the public research policy. Level II defines the business process architecture, i.e the meta process of academic and
scientific production, metrics for measuring performance, international benchmarks, criteria to
make these process auditable. Level II has also to make the link with the software architecture,
which is the key layer to make information system interoperable. Using the framework defined
in figure 2 helps identifying where to put emphasis in building this global architecture. Stage 1
and 2 (local and functional optimization, IT efficiency) are to be dealt with by agencies while
stage 3 (rationalizing data) needs a global architect that will defines the core processes to bewired and the key performance issues, what we call urbanization constraints to be integrated by
agencies when developing there is on their own. These constraints integrate both business
process and software architecture and only deal with technical infrastructure(level III) as far as
technical leadership is important to fulfil the requirements of interoperability. These constraints
pave the way to stage 4 (modularity) that will allow more autonomy both for agencies and
universities, and more monitoring of the research public policy.
It is obvious that such an approach require new capabilities that are to be built since they
are new as well in the administrative areas as in the scientific research culture. There is still a
chasm to be crossed between IT people and business people, who speak different languages and
do not share a common vision that is necessary to build such architecture. Confronting directly
with such a sea change would make, in the absence of a clear political leadership in managing
change, the decision of postponing the project or relying exclusively on technology in intent to
circumvent political and organizational questions.
The subversive way we chose to adopt allows us to uncover the hidden part of the
iceberg step by step at a pace defined by the progress in solving unforeseen strategic
- Page 21/25 -
7/31/2019 ISSubAgt
22/25
Using information system as a legitimate subversive agent
organizational issues, through the process of completing the first building block projects and
winning the first successes.
LESSONS FOR PUBLIC MANAGEMENT
We drawn from the conclusions of Miller and Lessard in the management of large
engineering projects and the literature on complex system to build a framework for the
monitoring of large, complex and multi actor IS project. Key success factors appear to be five:
Upstream conceptualization : Strategic issues must be clearly drawn and a critical path
roughly defined for the coming years, with a first script of the main risks to be dealt with. When
many vested interests are at stake and intertwined, the issues must be disclosed step by step,
from the less to the more complex. Thats what we call a subversive approach: ITs are a powerful change agent and designing a new IS will raise many embarrassing questions which, if
disclosed in one go, would provoked a coalition of contradictory vested interests to maintain the
status quo.
Strategic governance : The project manager has first to gain political support from the
top management and from politicians. Due to the medium term of such a project and its political
and social risks, such thing is not easy. Projects with clear outputs such as on line income tax
one stop shop have won such a support and may unfold in spite of government changes. It is not
the case for scientific research policy monitoring since issues and outputs are per se complex to
define and politically highly controversial. The less legitimacy the project manager gains from
his strategic governance, the more subversive his approach must be, and vice versa.
Quick wins : To put stakeholders mind at rest, its necessary to gain quick wins that will
demonstrate valuable outputs, and foster a problem solving dynamics that will help dealing with
more and more complex issues. Subversive questions will raise steps by steps as a natural
progress on the project path.
Capacity building : IT capacities are poor in the public sector, due both to the lag in
integrating the role of ITs as a change agent and to low salaries that forbid attracting high
profiles. The CIO function doesnt exist in the French ministerial administration that would
allow thinking in terms of global architecture and change in business. It exists in agencies
which are more experienced in IT projects, and allows them to question all the time the centre
competency and its legitimacy to conceive a global monitoring system.
Joining bottom-up and top down approach : To avoid this obstacles (poor legitimacy
of the centre in conceiving IS and the obsession of the thorie du complot among the
- Page 22/25 -
7/31/2019 ISSubAgt
23/25
Using information system as a legitimate subversive agent
peripherys stakeholders) its necessary to rely on initiatives of periphery actors and to federate
them in a global project, while, in the same move, taking the strategic initiatives the centre is
the sole legitimate actor to impulse.
From this framework emerge the figures of what a CIO, or an IT project leader, must be
as a change agent in the public sector. In the private sector, the role of the CIO went through
three ages in the last decades: In the seventies and until the first eighties, he was a support
function in charge of automating recurrent tasks. In the late 1980s and early 1990s, the CIO role
moved towards a re-engineering business processes agent, with a focus on cost control and
downsizing. He began to be concerned with process improvement, and automating processes
became closely related with productivity, cost killing in businesses and increased efficiency.
This trend culminated with the hype of ERP software and e-business in the late 1990s and the
dramaturgy of large IT projects that promised a lot, cost a lot and delivered disappointing
results. With the end of the dot.com bubble, the CIO role turned to be concerned with
information management as a source of creating competitive advantage (Marchand, 2004,
Rochet, 2006). From a support function, the CIO became a member of the top management with
a full strategic role (Cigref McKinsey, 2004).
In the public sector, the landscape is more varied: in some pilot sectors, e-administration
has become a means for re-engineering business processes. But in most part of theadministration, the CIO function is still a first age one. This has many negative consequences
on administrative productivity. In the absence of a central architect, IS accumulate layers and
become costly to maintain. In the ministry for education and research, there are more than 250
IS without any common plan, which maintenance consumes 75% of the IT budget, impeding
releasing credits for investments. There is a clear need for a policy of applicative euthanasia
that would simplify what has become a spaghetti network to turn it into a fully urbanized
information system.But this would need a strong political support. The new role of the CIO that is currently
emerging in the public sector would help the top management and politicians to become aware
of the issue and to understand to powerful role of ITs as a change agent so as to make public
policies monitorable and to stop wasting money in maintenance of underperforming systems.
- Page 23/25 -
7/31/2019 ISSubAgt
24/25
Using information system as a legitimate subversive agent
References
Allard-Poesi F., Drucker-Godard C. et Ehlinger S., (1999), Analyses de reprsentations et dediscours, In chapitre 16 de Thitart R.A. et al. (Eds), Mthodes de recherche en management. Dunod, pp.449-475.
Amabile, S., (1999), De la veille stratgique une attention rticule. Le rseau dattention inter-organisationnel des mutuelles dassurance automobile, Systmes dinformation et management, 4(2), pp.19-36.
Amabile, S., Gadille, M., (2006), Coopration inter-entreprises, systme dinformation etrenouvellement de lattention organisationnelle, Revue Franaise de Gestion, vol. 32, n 164.Argyris, C., Schn, D., (1978), Organizational Learning : a Theory of Action Perspective, AddisonWelsey.
Bardin, L. (2001), Lanalyse de contenu, Paris, PUF.Baumard, P., Benvenuti, J.A., (1998), Comptitivit et systme d'information, de l'outil d'analyse aumanagement stratgique, InterEditions.Bendix, R., (1968), Introduction. In R. Bendix (ed.): State and Society: 1-13. Boston: Little, Brownand Company.Botta-Genoulaz V., Millet P.-A., (2006), An investigation into the use of ERP systems in the servicesector, International Journal of Production Economics, 99(1/2), pp.202-221.Broadbent, M., Weill, P., (1997), Management by Maxim: How Business and IT Managers CanCreate IT Infrastructures, Sloan Management Review,Spring 1997, Vol. 38, No. 3, pp. 77-92Brynjolfsson, E., (2002), Computing Productivity: Firm-Level Evidence, MIT Sloan School of ManagementBrusoni, M., Prencipe, M., (2004), The Value and Cost of Modularity : A cognitive Perspective,
SPRU, SEWPSBrusoni Stefano, Prencipe Andrea, 2005, Making Design Rules : A Multi-Domain Perspective,SPRU, SEWPSCigref, (2004), Linnovation, le dfi de la socit de linformation, Cahier de recherche.
Cigref, (2004), Les leviers de la cration de valeur lre des technologies de linformation, Cahier de recherche.Cigref, (2005), La cration de connaissance au service de la cration de valeur, Cahier de recherche.Cigref, (2006), Quoi de neuf dans linnnovation pour le DSI?, Cahier de recherche.
Cigref-McKinsey, 2004, Dynamique des relations autour des systmes dinformation dans les
quipes de direction des grandes entreprises franaises, Cahier de recherche.Chevalier, J., Rouban, L., (2003), La rforme de lEtat et la nouvelle gestion publique : mythes etralits, Revue franaise dadministration publique, n105-106.Crozier M., Thoenig, J.-C., (1975), La rgulation des systmes organiss complexes, Revuefranaise de sociologie, XVI-1, pp.3-32.
Cohen W., Levinthal D., (1990), Absorbtive capability: a new perspective on learning andinnovation, Administrative science quaterly, n 35, pp. 128-152.
Davenport, T.H., (1998), Putting the enterprise into the enterprise system, Havard Business Review, july-August, pp. 121-133.
David, A., (2000), La recherche-intervention, cadre gnral pour la recherche en management ?, inDavid A., Hatchuel A., Laufer R. coord, Les nouvelles fondations des sciences de gestion, Vuibert.
- Page 24/25 -
http://sloanreview.mit.edu/smr/issue/1997/spring/http://sloanreview.mit.edu/smr/issue/1997/spring/http://sloanreview.mit.edu/smr/issue/1997/spring/7/31/2019 ISSubAgt
25/25
Using information system as a legitimate subversive agent
Eisenstadt, S., (1987), European Civilization in Comparative Perspective, OsloEisenhardt, K.M., (1989), Building theories from case study research, Academy of ManagementReview, vol.14, 532-550.Freeman, Chris, 2003, A Schumpeterian Renaissance ?, SPRU, SEWPS.
Hatchuel, A., (1994), Les savoirs de lintervention en entreprise, Entreprise & Histoire, n7, p.59-75.
Lewin K., (1951), Field Theory in Social Science', Harper and Row, New York.Luxemburg, R., (1904), Questions d'organisation de la social-dmocratie russe", texte rebaptis"Centralisme et dmocratie, publi en annexe Rforme ou rvolution ? (ditions Spartacus, 1972)Marchand, D., (2005), The Role of the Chief Information Officer, IMD, Genve
Miller, R, and Floricel S., (2003), An Exploratory Comparison of the Management of Innovation inthe New and Old Economies, R&D Management, Vol. 33, pp. 501-525
Miles, A.M., Huberman, A.M (1984), Analysing Qualitative Data : A Source Book for NewMethods, Beverly Hills, CA, Sage.
Miller, R., Lessard, D., (2001), The management of the large engineering projects, MIT Press.sterl, H., Brenner W., Hilbers, K., (1993), Total information Systems Management, J. Willey &sons.Reix, R., (1998), Systme dinformation et management des organisations, Paris, Vuibert, 409 p.
Rochet, C., (2002), Les tablissements publics nationaux, un chantier pilote pour la rforme delEtat, Rapport officiel, La Documentation Franaise, ParisRochet, C., (2002), Are Government Agencies a Good Way of Combining EntrepreneurialDynamism and Public Policy? The Case of National Public Establishments in France, OECD, Paris
Rochet, C., (2002), La gouvernance publique partage, OCDE, Paris, ouvrage collectif Rochet, C., 2004, Une seule flche pour deux cibles: le pari ambitieux de la rforme budgtaire enFrance, Management International, n 4-2004, Montral.Roos, J.W. (2003), Creating a Strategic IT Architecture Competency : Learning in Stages, Center for Information Systems Research (CISR), Working Paper n335, MIT Sloan School of Management.Stefanou, C.J., (2000), The Selection Process of Enterprise Resource Planning (ERP) Systems,Proceedings of the 6th Americas Conference on Information Systems, Long Beach, California 2000, pp. 988-991
Themistocleous, M., Irani, Z., OKeefe, R.M., Paul, R. (2001)., ERP problems and applicationintegration issues: An empirical survey, Business Process Management Journal, n7, vol.3, pp.195-
204.Thoenig, J.C., (1982), Les politiques de rforme des collectivits locales en France, in Lagroye etWright, pp.83-108.Wacheux, F., (1996), Mthodes Qualitatives et Recherche en Gestion, Economica, Paris.Wallerstein, I., (1974), The Modern World-System, I: Capitalist Agriculture and the Origins of European World-Economy in the Sixteenth Century. New York & London: Academic Press.
Weick, K. E. (1993), The Collapse of Sensemaking in Organizations: The Mann Gulch Disaster,Administrative Science Quarterly, 38: 4, pp. 628-652.
Yin, R. (1990), Case study Research : design and methods, CA : Sage Publications