Seven Ways to get Your Favoured IT Project Accepted — Politics in IT Evaluation
Keywords:
IT Evaluation, IT Decision Making, IT Assessment, Information Economics, Decision Making, Organisational Power & Politics Information ManagementAbstract
IS managers are being put under increasing pressure to justify the value of corporate ITIS expenditure. Their constant quest for the 'holy grail' continues, as existing methods and approaches of justifying ITIS expenditure are still failing to deliver. The decision making process is not as objective and transparent as it is claimed or intended to be. This paper discusses seven commonly used tactics used by business managers to influence IT appraisals. The paper takes a 'devil's advocate' position and adopts some irony when looking at the area of power and politics in IT evaluation. Rather than promoting the use of these techniques, this article aims to raise awareness that IT evaluation is not as rational as most IT evaluation researcherspractitioners would want it to be or indeed claim it to be. It is argued that rationalisation or counter tactics may counteract influence techniques in an attempt to get behind the cloak and dagger side of organisational power and politics, but politics and power in decision‑making cannot and should not be filtered out. Due to dissimilarities of objectives, limitations of time and information, influence techniques will always be used. However, rather than being counterproductive, these techniques are essential in the process of decision making of IT projects. They help organisations reach better decisions, which receive more commitment than decisions that were forced to comply with strictly rational approaches. Awareness of the influence and manipulation techniques used in practice will help to deal with power and politics in IT evaluation and thereby come to better IT investment decisions.Downloads
Published
Issue
Section
License
Open Access Publishing
The Electronic Journal of Information Systems Evaluation operates an Open Access Policy. This means that users can read, download, copy, distribute, print, search, or link to the full texts of articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. The only constraint on reproduction and distribution, and the only role for copyright in this domain, is that authors control the integrity of their work, which should be properly acknowledged and cited.
This Journal is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
