The ISD process as a 'live routine': The mindless behaviours of a narrative network

Thumbnail Image
4403_ECIS_2012_Sammon_et_al.pdf(179.47 KB)
Published version
Sammon, David
Nagle, Tadhg
McAvoy, John
Journal Title
Journal ISSN
Volume Title
AIS Electronic Library (AISeL)
Published Version
Research Projects
Organizational Units
Journal Issue
The objective of this exploratory study is to view an ISD process as a 'live routine' in an effort to identify the inefficiencies in the process caused by mindless behaviours. To meet this objective we present the findings from a sixteen month case study of an ISD organisation, examining the ISD process, the starting point of which is the requirements elicitation (RE) phase. A variety of data gathering techniques are used across two phases of data collection. The case data is organised as a narrative network (NN) of the live routine (ISD process) allowing us to understand the ISD process as a collection of functional events/patterns of action, generated by the enactment of the routine. The NN is showing itself to be a very powerful device to appreciate the knock-on impacts of vague and incomplete requirements (poor requirements elicitation) on downstream ISD process actions. The components of mindfulness are also utilised within the data analysis process to associate ISD process inefficiencies to mindless behaviours. In the findings of this research we generate an ‘ostensive’ rule that defines a valid sequence of action in the ISD process to overcome mindless behaviour. As a case study, the methods and results provide a means of comparison to additional cases of ISD organisations.
Routines , Information Systems Development (ISD) , Narrative network , Mindfulness , Case study
Sammon, D., Nagle, T. and McAvoy, J. (2012) 'The ISD Process as a 'Live Routine': The Mindless Behaviours of a Narrative Network', ECIS 2012: The 20th European Conference on Information Systems, Esade, Barcelona, Spain, 11-13 June. ECIS 2012 Proceedings. 211, (13pp).
Link to publisher’s version
© 2012, the authors. This material is brought to you by the European Conference on Information Systems (ECIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in ECIS 2012 Proceedings by an authorized administrator of AIS Electronic Library (AISeL).