02.07.2015 Views

Boundary activities and readiness for ... - Projekti-Instituutti

Boundary activities and readiness for ... - Projekti-Instituutti

Boundary activities and readiness for ... - Projekti-Instituutti

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Results<br />

practice, guarding <strong>activities</strong> may be about not including some<br />

organizational units or some people in the program, or refusing to utilize<br />

some of the parent organization’s st<strong>and</strong>ard procedures in the program<br />

work. They may also be about purposefully scoping some issues out of the<br />

program. Examples are given below:<br />

Q33 (Center, coordination group member): “A representative of our unit has not<br />

been invited to these meetings, even though this person is probably one of the<br />

leading experts [in this area] in Finl<strong>and</strong>.”<br />

Q34 (Bureau, project participant): “There is this [project audit procedure] that<br />

should in principle be applied to all IT programs, projects <strong>and</strong> systems … But<br />

this is like the shoemaker’s son going barefoot: the projects in [the program]<br />

have not followed [the policy].”<br />

Correspondingly, enclosing <strong>activities</strong> are about blocking the outwards flows<br />

from the program. These <strong>activities</strong> may include, <strong>for</strong> instance, keeping the<br />

plans within the core program team <strong>and</strong> restricting communications about<br />

sensitive issues to some groups within the parent organization. The<br />

following examples illustrate these <strong>activities</strong>:<br />

Q35 (Bureau, project manager): “From the beginning we realized that if we do<br />

[this project] with a low profile, we will get fewer comments from others. Thus<br />

we started to do this very independently, keeping a low profile, <strong>and</strong> we don’t<br />

really report to anyone either. … It provides us with freedom <strong>and</strong> enables fast<br />

operation.”<br />

Q36 (Chain, development area director <strong>and</strong> original program owner): “I think we<br />

have [communicated the plans] quite openly, except that naturally we have not<br />

told the specific figures of how many people will be affected <strong>and</strong> how much we<br />

have to decrease personnel.”<br />

Next, the three cases are compared in terms of the boundary <strong>activities</strong>.<br />

4.3.2 Comparison of boundary <strong>activities</strong> across the cases<br />

In this section, case-specific counts of boundary <strong>activities</strong> are presented <strong>and</strong><br />

the cases are compared in terms of boundary activity. Altogether 606<br />

quotations referring to boundary <strong>activities</strong> were identified in the three<br />

cases. Each of these quotations represented instances of one or two<br />

boundary activity types presented in the previous section. As described in<br />

the methodology chapter (section 3.5), the ten different types of boundary<br />

<strong>activities</strong> were in practice closely related. Many <strong>activities</strong> described by the<br />

in<strong>for</strong>mants were not related to just one type of boundary activity, <strong>and</strong> thus<br />

some quotes describing boundary <strong>activities</strong> were connected with two<br />

boundary activity types. Since all 606 quotes illustrating boundary <strong>activities</strong><br />

132

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!