The Dynamics of IT Workaround Practices - A Theoretical Concept and an Empirical Assessment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 7
Abstract
An interesting phenomenon that has received limited attention in the extant literature is that of IT workaround practices. Based on Ashby's Law of Requisite Variety, workarounds were found to be used to accomplish the basic task of matching unmatched variety in the system. The Interaction Effectiveness (IE) ratio of 1.4 was used as a baseline to uncover potential sources of workarounds. The Echo method was used to collect data from 42 users in a high-technology company (HTC). Enablers of and barriers to workaround practices were divided into four main categories - flexibility, reliability, ease of use, and coordination - whereas workarounds were divided into three categories - using other tools, seeking help, and accepting. The results of the case study indicate that "reliability" is the dominant category for both helpful and non-helpful incidents, whereas "coordination" was the least significant. Of the workaround mechanisms, "using other tools" was the most significant category for all users. The findings suggest cycles of continuous improvement to the IE ratio to alleviate the need for workarounds, but a more fundamental issue concerning the source of workaround behaviors is a function of misfits between input variety by users and variety handling capabilities of the system.
Authors and Affiliations
Ahmed Alojairi
Networking Issues for Security and Privacy in Mobile Health Apps
It is highly important to give social care on the personal information that is collected by mobile health applications. There has been a rise in the mobile applications which are applied in almost all the departments and...
Genetic algorithms to optimize base station sitting in WCDMA networks
In UMTS network, radio planning cannot only be based on signal predictions, but it must also consider the traffic distribution, the power control mechanism as well as the power limits and the signal quality constraints....
Web Service Testing Techniques: A Systematic Literature Review
These days continual demands on loosely coupled systems have web service gives basic necessities to deliver resolution that are adaptable and sufficient to be work at runtime for maintaining the high quality of the syste...
Building Trust In Cloud Using Public Key Infrastructure - A step towards cloud trust
Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security conc...
A Decision Tree Approach for Predicting Student Grades in Research Project using Weka
Data mining in education is an emerging multidiscipline research field especially with the upsurge of new technologies used in educational systems that led to the storage of massive student data. This study used classifi...