Boundary activities and readiness for ... - Projekti-Instituutti
Boundary activities and readiness for ... - Projekti-Instituutti
Boundary activities and readiness for ... - Projekti-Instituutti
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Discussion<br />
resources to mobilize the trans<strong>for</strong>mation. From the third category, crossing<br />
the program’s boundary outwards, in<strong>for</strong>ming <strong>activities</strong> aim to in<strong>for</strong>m<br />
others in the parent organization about the program’s existence, the<br />
rationale behind it, the program’s goals <strong>and</strong> <strong>activities</strong>, <strong>and</strong> its status.<br />
Legitimating <strong>and</strong> committing <strong>activities</strong> aim to make the program accepted<br />
<strong>and</strong> to get those in the parent organization to support the program, while<br />
influencing <strong>activities</strong> are about causing changes in the parent organization<br />
in other areas than those directly related to the change program’s goals.<br />
In addition to the above listed boundary crossing <strong>and</strong> shaping <strong>activities</strong>,<br />
also isolative boundary <strong>activities</strong> were identified, <strong>for</strong>ming the fourth<br />
category of <strong>activities</strong>. Guarding <strong>activities</strong> are about blocking the inward<br />
flows to the program <strong>and</strong> this way protecting the program from external<br />
influences, whereas enclosing <strong>activities</strong> block outward communication<br />
from the program. These isolative boundary <strong>activities</strong> aim to shelter the<br />
emerging change endeavors <strong>and</strong> provide the program teams a peaceful<br />
work environment to advance the program plans.<br />
The array of boundary <strong>activities</strong> revealed by the analysis is largely in line<br />
with earlier research findings concerning intra-organizational boundary<br />
<strong>activities</strong> at the unit, team or group level. Many boundary activity types<br />
identified in the current study have been reported in earlier research. For<br />
example, several previous studies have reported boundary <strong>activities</strong> related<br />
to in<strong>for</strong>mation seeking, referred to as scouting (Ancona & Caldwell, 1988,<br />
1992a; Druskat & Wheeler, 2003) or gathering intelligence (Balogun et al.,<br />
2005). In<strong>for</strong>ming <strong>activities</strong> have been characterized earlier as displaying<br />
work across boundaries by making it visible <strong>and</strong> accessible to others in the<br />
organization (Kellogg et al., 2006). Negotiating <strong>activities</strong> have been<br />
reported by Levina <strong>and</strong> Vaast (2005) in the context of in<strong>for</strong>mation system<br />
implementation projects, <strong>and</strong> negotiating has also been included in task<br />
coordinating activity reported by Ancona <strong>and</strong> Caldwell (1992a) in the<br />
context of product development teams. Related to the isolative boundary<br />
<strong>activities</strong>, the studies by Ancona <strong>and</strong> Caldwell (1988, 1992a) have also<br />
reported guarding <strong>activities</strong> <strong>and</strong> enclosing <strong>activities</strong> (referred to as sentry<br />
<strong>activities</strong>).<br />
Further illustrating the similarities to previous research findings,<br />
legitimating <strong>and</strong> committing <strong>activities</strong> largely resemble ambassadorial<br />
<strong>activities</strong>, which Ancona <strong>and</strong> Caldwell (1988, 1992a) have suggested to be<br />
critical to the success of product development teams. The concept of<br />
ambassadorial <strong>activities</strong>, as described by Ancona <strong>and</strong> Caldwell, includes<br />
lobbying resources <strong>for</strong> the team, <strong>and</strong> thus encompasses resource seeking<br />
<strong>activities</strong>, which were included as a separate activity type in the current<br />
study. Furthermore, a boundary activity similar to legitimating, committing<br />
181