A Guide for Stakeholder Analysis in IS/IT Management and Research: The Case of Broadband Availability in Rural North Carolina

IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Judith Gebauer, Minoo Modaresnezhad, Christopher Sibona, Kevin Matthews
{"title":"A Guide for Stakeholder Analysis in IS/IT Management and Research: The Case of Broadband Availability in Rural North Carolina","authors":"Judith Gebauer, Minoo Modaresnezhad, Christopher Sibona, Kevin Matthews","doi":"10.17705/1cais.05326","DOIUrl":null,"url":null,"abstract":"Stakeholder analysis is a methodology that can provide valuable insights about a phenomenon. Information systems and information technology researchers have utilized stakeholder analysis to understand and learn from successes, failures, and other aspects of IS/IT initiatives. In this tutorial, we provide guidelines for conducting a stakeholder analysis currently missing in the IS/IT discipline despite being repeatedly called for. We reviewed studies on stakeholder analysis within IS/IT first, but found that there was not sufficient coverage. Then we went outside the discipline and found relevant studies in the areas of organizational and strategic management and public policy. Our analysis, then, consists of a review and a combination of the findings of studies from within the IS/IT discipline and studies in organizational and strategic management and public policy. Our guidelines start with determining who the stakeholders are related to a phenomenon and what key concerns these stakeholders have about the phenomenon. In the next step, we relate stakeholders to one another and across the key concerns and point out how to identify possible coalitions. Last, we describe how to apply these findings to determine strategies for managing stakeholders or building theory around a phenomenon and its concerns. These final steps can be used to make policy recommendations, provide guidance for IS/IT-related initiatives, or present constructs and relationships that can be tested by future researchers. We demonstrate the applicability of our guidelines with a case study about broadband availability in rural North Carolina.","PeriodicalId":47724,"journal":{"name":"Communications of the Association for Information Systems","volume":"35 1","pages":"0"},"PeriodicalIF":1.7000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Communications of the Association for Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17705/1cais.05326","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Stakeholder analysis is a methodology that can provide valuable insights about a phenomenon. Information systems and information technology researchers have utilized stakeholder analysis to understand and learn from successes, failures, and other aspects of IS/IT initiatives. In this tutorial, we provide guidelines for conducting a stakeholder analysis currently missing in the IS/IT discipline despite being repeatedly called for. We reviewed studies on stakeholder analysis within IS/IT first, but found that there was not sufficient coverage. Then we went outside the discipline and found relevant studies in the areas of organizational and strategic management and public policy. Our analysis, then, consists of a review and a combination of the findings of studies from within the IS/IT discipline and studies in organizational and strategic management and public policy. Our guidelines start with determining who the stakeholders are related to a phenomenon and what key concerns these stakeholders have about the phenomenon. In the next step, we relate stakeholders to one another and across the key concerns and point out how to identify possible coalitions. Last, we describe how to apply these findings to determine strategies for managing stakeholders or building theory around a phenomenon and its concerns. These final steps can be used to make policy recommendations, provide guidance for IS/IT-related initiatives, or present constructs and relationships that can be tested by future researchers. We demonstrate the applicability of our guidelines with a case study about broadband availability in rural North Carolina.
IS/IT管理和研究中的利益相关者分析指南:北卡罗来纳州农村宽带可用性案例
利益相关者分析是一种方法,可以提供有关现象的有价值的见解。信息系统和信息技术研究人员利用利益相关者分析来理解和学习成功、失败和其他方面的信息系统/IT计划。在本教程中,我们提供了指导方针,用于执行目前在IS/IT规程中缺失的涉众分析,尽管它被反复呼吁。我们首先回顾了IS/IT内部利益相关者分析的研究,但发现没有足够的覆盖。然后我们走出学科,在组织和战略管理以及公共政策领域找到了相关的研究。因此,我们的分析包括对IS/IT学科研究结果的回顾和结合,以及对组织和战略管理以及公共政策的研究结果。我们的指导方针从确定谁是与某个现象相关的涉众以及这些涉众对该现象的主要关注点开始。在下一步中,我们将利益相关者彼此联系起来,并跨越关键问题,并指出如何确定可能的联盟。最后,我们描述了如何应用这些发现来确定管理利益相关者的策略或围绕一种现象及其关注点建立理论。这些最后的步骤可以用来制定政策建议,为与信息技术相关的计划提供指导,或者为未来的研究人员提供可以测试的结构和关系。我们通过一个关于北卡罗莱纳州农村宽带可用性的案例研究来证明我们的指导方针的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Communications of the Association for Information Systems
Communications of the Association for Information Systems COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
3.90
自引率
20.00%
发文量
35
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信