Skip to main content

Risk and information systems: developing the analysis

  • Chapter
Information management

Abstract

Risk and information systems receive a variety of treatments in other chapters. Thus Ward put forward an approach for identifying and spreading risk across the information systems portfolio. Peters in Chapter 5 showed how business risks could be identified and information systems use could be related to minimization of those risks. Wiseman described the usefulness of the information economics approach for risk identification, and elements of both Chapters 8 and 10 have shown how this approach can be tailored to produce usable, practical analytical frameworks. This chapter seeks to build on these contributions in several ways. Additional frameworks for risk classification at the investment appraisal stage are assessed. A further framework, drawn from the organization studies literature, is then applied to several cases illustrating risk in information systems applications in different organizational settings. The chapter argues the merit in interpreting risk operationally as not just inherent in certain structural features of the environment or of a project, but also arising as a result of distinctive human and organizational practices and patterns of belief and action. Building on the argument made by Wiseman about the criticality and neglect of organizational risk (see Chapter 9), this chapter suggests that more comprehensive frameworks for risk assessment are needed to complement the all too frequently encountered truncated forms of assessment developed from the project management, operational research and financial management fields.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Beath, C. and Ives, B. (1989) The Information Technology Champion: Aiding and Abetting, Care and Feeding. Oxford Institute of Information Management Research and Discussion Papers RDP 89/2, Templeton College, Oxford.

    Google Scholar 

  • Cash, J., McFarlan, W. and McKenney, J. (1992) Corporate Information Systems Management, Irwin, Boston.

    Google Scholar 

  • Charette, R. (1991) Application Strategies for Risk Analysis, McGraw-Hill, New York.

    Google Scholar 

  • Chew, B., Leonard-Barton, D. and Bohn, R. (1991) Beating Murphy’s Law. Sloan Management Review, 5, 5–16.

    Google Scholar 

  • Coleman, T. and Jamieson, M. (1991) Information Systems: Evaluating Intangible Benefits at the Feasibility Stage of Project Appraisal. Unpublished MBA thesis, City University Business School, London.

    Google Scholar 

  • Collingridge, D. (1992) The Management of Scale, Routledge, London.

    Google Scholar 

  • Collins, T. (1992) Health computing: the wasted millions. Computer Weekly, 7 May, 32–4. Cooper, R. and Zmud, R. (1990) Information technology implementation research: a technological diffusion approach. Management Science, 36 (2), 123–39.

    Google Scholar 

  • Corder, C. (1989) Taming Your Company Computer, McGraw-Hill, London.

    Google Scholar 

  • Currie, W. (1989) The art of justifying new technology to top management. Omega, 17 (5), 409–18.

    Article  Google Scholar 

  • Earl, M. (1989). Management Strategies for Information Technology, Prentice-Hall, London.

    Google Scholar 

  • Earl, M. and Runge, D. (1987) Using Telecommunications-based Information Systems for Competitive Advantage. Oxford Institute of Information Management Research and Discussion Papers RDP 87/1, Templeton College, Oxford.

    Google Scholar 

  • Farbey, B., Land F. and Targett, D. (1992) Evaluating investments in IT. Journal of Information Technology, 7 (2), 100–12.

    Article  Google Scholar 

  • Feeny, D., Earl, M. and Edwards, B. (1989) IS Arrangements to Suit Complex Organizations: 2. Integrating the Efforts of Users and Specialists. Research Paper RDP89/5, Templeton College, Oxford.

    Google Scholar 

  • Gallagher, J. and Scott, R. (1988) Kwik–Fit Holdings. Case 388–007–1, Case Clearing House, Cranfield.

    Google Scholar 

  • Harrow, J. and Willcocks, L. (1992) Management, innovation and organizational learning. In Rediscovering Public Services Management (eds L. Willcocks and J. Harrow ), McGraw-Hill, London.

    Google Scholar 

  • Hodgkinson, S. (1991) The Role of the Corporate Information Technology Function in the Large Multibusiness Company. Oxford Institute of Information Management Research and Discussion Papers, RDP 1/2, Templeton College, Oxford.

    Google Scholar 

  • Hull, J. (1990) Application of risk analysis techniques in proposal assessment. Project Management, 8 (3), 152–7.

    Article  Google Scholar 

  • Johnston, H. and Vitale, M. (1988) Creating competitive advantage with interorganizational systems. MIS Quarterly, June, 153–65.

    Google Scholar 

  • Kearney, AT (1990) Breaking the Barriers: IT Effectiveness in Great Britain and Ireland, AT Kearney/LIMA, London.

    Google Scholar 

  • Keen, P. (1991) Shaping the Future, Harvard Business Press, Boston.

    Google Scholar 

  • KEW Associates/Computer Weekly (1992) UK IT Market Analysis, Autumn 1992 edition, Computer Weekly, London.

    Google Scholar 

  • Kumar, K. (1990) Post-implementation evaluation of computer-based IS: current practices. Communications of the ACM, 33 (2), 203–12.

    Article  Google Scholar 

  • Kwon, T. and Zmud, R. (1987) Unifying the fragmented models of information systems implementation, In Critical Issues in Information Systems Research (eds J. Boland and R. Hirschheim ), Wiley, Chichester.

    Google Scholar 

  • Loudon, K. and Loudon, J. (1991) Management Information Systems: A Contemporary Perspective, Macmillan, New York.

    Google Scholar 

  • Lyttinen, K. and Hirschheim, R. (1987) Information systems failures — a survey and classification of the empirical literature. In Oxford Surveys of Information Technology, Vol. 4 (ed. P. Zorkoczy ), Oxford University Press, Oxford, pp. 257–309.

    Google Scholar 

  • Margetts, H. (1991a) Information technology in the public sector: new risks, new dangers. Paper at the ESRC/LSE Seminar Series on Hazard Management, ’IT Developments and Hazard Analysis’, London School of Economics, London, November.

    Google Scholar 

  • Margetts, H. (1991b) The computerization of Social Security: the way forward or a step backwards? Public Administration, 69 (3), Autumn.

    Google Scholar 

  • Margetts, H. and Willcocks, L. (1993) Information technology in public sector settings: disaster faster? Public Money and Management, 13 (2), 49–56.

    Article  Google Scholar 

  • Mintzberg, H. (1989) Mintzberg on Management, Free Press, New York.

    Google Scholar 

  • National Audit Office (1989) Department of Social Security, Operational Strategy. Report by the Comptroller and Auditor General, HMSO, London.

    Google Scholar 

  • National Audit Office (1991). Managing Computer Projects in the National Health Service, HMSO, London.

    Google Scholar 

  • OTR Group (1992) Report detailed in Computer Weekly, 12 December, p. 12.

    Google Scholar 

  • Parker, M., Benson, R. and Trainor, E. (1988) Information Economics: Linking Business Performance to Information Technology, Prentice-Hall, Englewood Cliffs, New Jersey.

    Google Scholar 

  • Pettigrew, A. (1985) The Awakening Giant: Continuity and Change in ICI, Blackwell, Oxford. Pettigrew, A. and Whipp, R. (1991) Managing Change for Competitive Success, Blackwell, Oxford.

    Google Scholar 

  • Pettigrew, A., Ferlie, E. and McKee, L. (1992) Shaping Strategic Change, Sage, London.

    Google Scholar 

  • Pike, R. and Ho, S. (1991) Risk analysis in capital budgeting: barriers and benefits. Omega, 19 (4) 235–45.

    Article  Google Scholar 

  • Post, G. and Dilz, D. (1986) A stochastic dominance approach to risk analysis of computer systems. MIS Quarterly, December, 362–75.

    Google Scholar 

  • Rogers, E. and Kim, J. (1985) Diffusion of innovations in public organizations, in Innovation in the Public Sector (eds R. Merritt and A. Merritt ), Sage, Beverly Hills.

    Google Scholar 

  • Scott-Morton, M. (ed.) (1991) The Corporation of the 1990s,Oxford University Press, Oxford. Shenhar, A. (1992) Project management style and the space shuttle program (part 2): A retrospective look. Project Management Journal,23 (1), 32–7.

    Google Scholar 

  • Strassmann, P. (1990) The Business Value of Computers, The Information Economics Press, New Canaan.

    Google Scholar 

  • Stringer, J. (1992) Risk in large projects, In Operational Research Tutorial Papers (ed. M. Mortimer ), Operational Research Society, London.

    Google Scholar 

  • Symons, V. and Walsham, G. (1988) The evaluation of information systems: a critique. Journal of Applied Systems Analysis, 15, 119–32.

    Google Scholar 

  • Tornatzky, L. and Klein, K. (1982) Innovation characteristics and innovation adoption implementation: a meta-analysis of Findings. IEEE Transactions on Engineering Management, February, 28–45.

    Google Scholar 

  • Vitale, M. (1986) The growing risks of information systems success. MIS Quarterly, December, 327–34.

    Google Scholar 

  • Walsham, G. (1992) Interpreting Information Systems in Organizations, Wiley, Chichester. Walton, R. (1989) Up and Running: Integrating Information Technology and the Organization, Harvard Business Press, Boston.

    Google Scholar 

  • Warner, F. et al. (1992) Risk: Analysis, Perception and Management, The Royal Society, London. Willcocks, L. (1989) Information technology in public sector settings: towards effective systems. International Journal of Public Sector Management, 2 (3), 15–29.

    Google Scholar 

  • Willcocks, L. (1991) Information technology and human resource issues in the 1990s: integration through culture. Paper presented at the Fifth Annual Conference of the British Academy of Management, ’Business: Advancing the Horizons’, University of Bath, 22–24 September.

    Google Scholar 

  • Willcocks, L. (1992a) Evaluating information technology investments: research findings and reappraisal. Journal of Information Systems, 2 (3), 1–26.

    Google Scholar 

  • Willcocks, L. (1992b) The manager as technologist, In Rediscovering Public Services Management (eds L. Willcocks and J. Harrow ), McGraw-Hill, London.

    Google Scholar 

  • Willcocks, L. (1992c) Strategy development and delivery: dealing with the IT evaluation question, In Creating a Business-based IT Strategy (ed. A. Brown ), Chapman & Hall, London.

    Google Scholar 

  • Willcocks, L. and Lester, S. (1993) How organizations evaluate and control information systems investments: recent UK survey evidence. Paper for the IFIP WG8.2 Working Conference — Information Systems Development: Human, Social and Organizational Aspects, Noordwijkerhout, The Netherlands, 17–19 May.

    Google Scholar 

  • Willcocks, L. and Margetts, H. (1991) Informatization in UK public services: from implementation, through strategy, to management. Paper at the EGPA Conference — Informatization in Public Administration, The Hague, The Netherlands, August.

    Google Scholar 

  • Willcocks, L. and Margetts, H. (1993) Informatization in public and private sector settings: distinctive or common risks? Informatization and the Public Sector (forthcoming).

    Google Scholar 

  • Willcocks, L. and Mark, A. (1989) IT systems implementation: research findings from the public sector. Journal of Information Technology, 4 (2), 92–103.

    Article  Google Scholar 

  • Willcocks, L. and Mason, D. (1987a) The DHSS Operational Strategy, 1975–1986. Business Case File in Information Technology, Van Nostrand Reinhold, London.

    Google Scholar 

  • Willcocks, L. and Mason, D. (1987b) Computerising Work, Paradigm, London.

    Google Scholar 

  • Williams, T (1990) Risk analysis using an embedded CPA package. Project Management, 8 (2), 84–8.

    Article  Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Leslie Willcocks

About this chapter

Cite this chapter

Willcocks, L., Margetts, H. (1994). Risk and information systems: developing the analysis. In: Information management. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-3208-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-3208-2_11

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-412-41540-1

  • Online ISBN: 978-1-4899-3208-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics