Abstract
Risk and information systems receive a variety of treatments in other chapters. Thus Ward put forward an approach for identifying and spreading risk across the information systems portfolio. Peters in Chapter 5 showed how business risks could be identified and information systems use could be related to minimization of those risks. Wiseman described the usefulness of the information economics approach for risk identification, and elements of both Chapters 8 and 10 have shown how this approach can be tailored to produce usable, practical analytical frameworks. This chapter seeks to build on these contributions in several ways. Additional frameworks for risk classification at the investment appraisal stage are assessed. A further framework, drawn from the organization studies literature, is then applied to several cases illustrating risk in information systems applications in different organizational settings. The chapter argues the merit in interpreting risk operationally as not just inherent in certain structural features of the environment or of a project, but also arising as a result of distinctive human and organizational practices and patterns of belief and action. Building on the argument made by Wiseman about the criticality and neglect of organizational risk (see Chapter 9), this chapter suggests that more comprehensive frameworks for risk assessment are needed to complement the all too frequently encountered truncated forms of assessment developed from the project management, operational research and financial management fields.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beath, C. and Ives, B. (1989) The Information Technology Champion: Aiding and Abetting, Care and Feeding. Oxford Institute of Information Management Research and Discussion Papers RDP 89/2, Templeton College, Oxford.
Cash, J., McFarlan, W. and McKenney, J. (1992) Corporate Information Systems Management, Irwin, Boston.
Charette, R. (1991) Application Strategies for Risk Analysis, McGraw-Hill, New York.
Chew, B., Leonard-Barton, D. and Bohn, R. (1991) Beating Murphy’s Law. Sloan Management Review, 5, 5–16.
Coleman, T. and Jamieson, M. (1991) Information Systems: Evaluating Intangible Benefits at the Feasibility Stage of Project Appraisal. Unpublished MBA thesis, City University Business School, London.
Collingridge, D. (1992) The Management of Scale, Routledge, London.
Collins, T. (1992) Health computing: the wasted millions. Computer Weekly, 7 May, 32–4. Cooper, R. and Zmud, R. (1990) Information technology implementation research: a technological diffusion approach. Management Science, 36 (2), 123–39.
Corder, C. (1989) Taming Your Company Computer, McGraw-Hill, London.
Currie, W. (1989) The art of justifying new technology to top management. Omega, 17 (5), 409–18.
Earl, M. (1989). Management Strategies for Information Technology, Prentice-Hall, London.
Earl, M. and Runge, D. (1987) Using Telecommunications-based Information Systems for Competitive Advantage. Oxford Institute of Information Management Research and Discussion Papers RDP 87/1, Templeton College, Oxford.
Farbey, B., Land F. and Targett, D. (1992) Evaluating investments in IT. Journal of Information Technology, 7 (2), 100–12.
Feeny, D., Earl, M. and Edwards, B. (1989) IS Arrangements to Suit Complex Organizations: 2. Integrating the Efforts of Users and Specialists. Research Paper RDP89/5, Templeton College, Oxford.
Gallagher, J. and Scott, R. (1988) Kwik–Fit Holdings. Case 388–007–1, Case Clearing House, Cranfield.
Harrow, J. and Willcocks, L. (1992) Management, innovation and organizational learning. In Rediscovering Public Services Management (eds L. Willcocks and J. Harrow ), McGraw-Hill, London.
Hodgkinson, S. (1991) The Role of the Corporate Information Technology Function in the Large Multibusiness Company. Oxford Institute of Information Management Research and Discussion Papers, RDP 1/2, Templeton College, Oxford.
Hull, J. (1990) Application of risk analysis techniques in proposal assessment. Project Management, 8 (3), 152–7.
Johnston, H. and Vitale, M. (1988) Creating competitive advantage with interorganizational systems. MIS Quarterly, June, 153–65.
Kearney, AT (1990) Breaking the Barriers: IT Effectiveness in Great Britain and Ireland, AT Kearney/LIMA, London.
Keen, P. (1991) Shaping the Future, Harvard Business Press, Boston.
KEW Associates/Computer Weekly (1992) UK IT Market Analysis, Autumn 1992 edition, Computer Weekly, London.
Kumar, K. (1990) Post-implementation evaluation of computer-based IS: current practices. Communications of the ACM, 33 (2), 203–12.
Kwon, T. and Zmud, R. (1987) Unifying the fragmented models of information systems implementation, In Critical Issues in Information Systems Research (eds J. Boland and R. Hirschheim ), Wiley, Chichester.
Loudon, K. and Loudon, J. (1991) Management Information Systems: A Contemporary Perspective, Macmillan, New York.
Lyttinen, K. and Hirschheim, R. (1987) Information systems failures — a survey and classification of the empirical literature. In Oxford Surveys of Information Technology, Vol. 4 (ed. P. Zorkoczy ), Oxford University Press, Oxford, pp. 257–309.
Margetts, H. (1991a) Information technology in the public sector: new risks, new dangers. Paper at the ESRC/LSE Seminar Series on Hazard Management, ’IT Developments and Hazard Analysis’, London School of Economics, London, November.
Margetts, H. (1991b) The computerization of Social Security: the way forward or a step backwards? Public Administration, 69 (3), Autumn.
Margetts, H. and Willcocks, L. (1993) Information technology in public sector settings: disaster faster? Public Money and Management, 13 (2), 49–56.
Mintzberg, H. (1989) Mintzberg on Management, Free Press, New York.
National Audit Office (1989) Department of Social Security, Operational Strategy. Report by the Comptroller and Auditor General, HMSO, London.
National Audit Office (1991). Managing Computer Projects in the National Health Service, HMSO, London.
OTR Group (1992) Report detailed in Computer Weekly, 12 December, p. 12.
Parker, M., Benson, R. and Trainor, E. (1988) Information Economics: Linking Business Performance to Information Technology, Prentice-Hall, Englewood Cliffs, New Jersey.
Pettigrew, A. (1985) The Awakening Giant: Continuity and Change in ICI, Blackwell, Oxford. Pettigrew, A. and Whipp, R. (1991) Managing Change for Competitive Success, Blackwell, Oxford.
Pettigrew, A., Ferlie, E. and McKee, L. (1992) Shaping Strategic Change, Sage, London.
Pike, R. and Ho, S. (1991) Risk analysis in capital budgeting: barriers and benefits. Omega, 19 (4) 235–45.
Post, G. and Dilz, D. (1986) A stochastic dominance approach to risk analysis of computer systems. MIS Quarterly, December, 362–75.
Rogers, E. and Kim, J. (1985) Diffusion of innovations in public organizations, in Innovation in the Public Sector (eds R. Merritt and A. Merritt ), Sage, Beverly Hills.
Scott-Morton, M. (ed.) (1991) The Corporation of the 1990s,Oxford University Press, Oxford. Shenhar, A. (1992) Project management style and the space shuttle program (part 2): A retrospective look. Project Management Journal,23 (1), 32–7.
Strassmann, P. (1990) The Business Value of Computers, The Information Economics Press, New Canaan.
Stringer, J. (1992) Risk in large projects, In Operational Research Tutorial Papers (ed. M. Mortimer ), Operational Research Society, London.
Symons, V. and Walsham, G. (1988) The evaluation of information systems: a critique. Journal of Applied Systems Analysis, 15, 119–32.
Tornatzky, L. and Klein, K. (1982) Innovation characteristics and innovation adoption implementation: a meta-analysis of Findings. IEEE Transactions on Engineering Management, February, 28–45.
Vitale, M. (1986) The growing risks of information systems success. MIS Quarterly, December, 327–34.
Walsham, G. (1992) Interpreting Information Systems in Organizations, Wiley, Chichester. Walton, R. (1989) Up and Running: Integrating Information Technology and the Organization, Harvard Business Press, Boston.
Warner, F. et al. (1992) Risk: Analysis, Perception and Management, The Royal Society, London. Willcocks, L. (1989) Information technology in public sector settings: towards effective systems. International Journal of Public Sector Management, 2 (3), 15–29.
Willcocks, L. (1991) Information technology and human resource issues in the 1990s: integration through culture. Paper presented at the Fifth Annual Conference of the British Academy of Management, ’Business: Advancing the Horizons’, University of Bath, 22–24 September.
Willcocks, L. (1992a) Evaluating information technology investments: research findings and reappraisal. Journal of Information Systems, 2 (3), 1–26.
Willcocks, L. (1992b) The manager as technologist, In Rediscovering Public Services Management (eds L. Willcocks and J. Harrow ), McGraw-Hill, London.
Willcocks, L. (1992c) Strategy development and delivery: dealing with the IT evaluation question, In Creating a Business-based IT Strategy (ed. A. Brown ), Chapman & Hall, London.
Willcocks, L. and Lester, S. (1993) How organizations evaluate and control information systems investments: recent UK survey evidence. Paper for the IFIP WG8.2 Working Conference — Information Systems Development: Human, Social and Organizational Aspects, Noordwijkerhout, The Netherlands, 17–19 May.
Willcocks, L. and Margetts, H. (1991) Informatization in UK public services: from implementation, through strategy, to management. Paper at the EGPA Conference — Informatization in Public Administration, The Hague, The Netherlands, August.
Willcocks, L. and Margetts, H. (1993) Informatization in public and private sector settings: distinctive or common risks? Informatization and the Public Sector (forthcoming).
Willcocks, L. and Mark, A. (1989) IT systems implementation: research findings from the public sector. Journal of Information Technology, 4 (2), 92–103.
Willcocks, L. and Mason, D. (1987a) The DHSS Operational Strategy, 1975–1986. Business Case File in Information Technology, Van Nostrand Reinhold, London.
Willcocks, L. and Mason, D. (1987b) Computerising Work, Paradigm, London.
Williams, T (1990) Risk analysis using an embedded CPA package. Project Management, 8 (2), 84–8.
Rights and permissions
Copyright information
© 1994 Leslie Willcocks
About this chapter
Cite this chapter
Willcocks, L., Margetts, H. (1994). Risk and information systems: developing the analysis. In: Information management. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-3208-2_11
Download citation
DOI: https://doi.org/10.1007/978-1-4899-3208-2_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-412-41540-1
Online ISBN: 978-1-4899-3208-2
eBook Packages: Springer Book Archive