当前位置: X-MOL 学术Information Systems Journal › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Mechanisms of power inscription into IT governance: Lessons from two national digital identity systems
Information Systems Journal ( IF 7.767 ) Pub Date : 2021-02-02 , DOI: 10.1111/isj.12325
Rony Medaglia 1 , Ben Eaton 1, 2 , Jonas Hedman 1 , Edgar A. Whitley 3
Affiliation  

Establishing IT governance arrangements is a deeply political process, where relationships of power play a crucial role. While the importance of power relationships is widely acknowledged in IS literature, specific mechanisms whereby the consequences of power relationships affect IT governance arrangements are still under-researched. This study investigates the way power relationships are inscribed in the governance of digital identity systems in Denmark and the United Kingdom, where public and private actors are involved. Drawing on the theoretical lens of circuits of power, we contribute to research on the role of power in IT governance by identifying two distinct mechanisms of power inscription into IT governance: power cultivation and power limitation.

中文翻译:

IT治理中的权力铭刻机制:来自两个国家数字身份系统的经验教训

建立 IT 治理安排是一个深刻的政治过程,其中权力关系起着至关重要的作用。虽然权力关系的重要性在 IS 文献中得到了广泛认可,但权力关系影响 IT 治理安排的具体机制仍未得到充分研究。本研究调查了权力关系在丹麦和英国的数字身份系统治理中的铭刻方式,其中涉及公共和私人行为者。利用权力回路的理论视角,我们通过确定两种不同的权力铭刻在 IT 治理中的机制:权力培育和权力限制,为权力在 IT 治理中的作用的研究做出了贡献。
更新日期:2021-02-02
down
wechat
bug