Kalle Lyytinen

Learn More
Advocates of software risk management claim that by identifying and analyzing threats to success (i.e., risks) action can be taken to reduce the cbance of failure ofa project. The first step in theriskmanagement process is to identify tbe risk itself, so tbat appropriate countermeasures can be taken. One problem in this task, however, is that no validated(More)
We propose a design theory that tackles dynamic complexity in the design for Information Infrastructures (IIs) defined as a shared, open, heterogeneous and evolving socio-technical system of Information Technology (IT) capabilities. Examples of IIs include the Internet, or industry-wide Electronic Data Interchange (EDI) networks. IIs are recursively(More)
Computer Aided Software Engineering (CASE) environments have spread at a lower pace than expected. One reason for this is the immaturity of existing environments in supporting development in-the-large and by-many and their inability to address the varying needs of the software developers. In this paper we report on the development of a next generation CASE(More)
In this essay, we argue that pervasive digitization gives birth to a new type of product architecture, the layered modular architecture. The layered modular architecture extends the modular architecture of physical products by incorporating four loosely coupled layers of devices, networks, services, and contents created by digital technology. We posit that(More)
Our era is one of increasingly pervasive digital technologies, which penetrate deeply into the very core of the products, services, and operations of many organizations and radically change the nature of product and service innovations. The fundamental properties of digital technology are reprogrammability and data homogenization. Together, they provide an(More)
We've all heard tales of multimillion dollar mistakes that somehow ran off course. Are software projects that risky or do managers need to take a fresh approach when preparing for such critical expeditions? Software projects are notoriously difficult to manage and too many of them end in failure. In 1995, annual U.S. spending on software projects reached(More)
Anomadic information environment is a heterogeneous assemblage of interconnected technological, and social, and organizational elements that enable the physical and social mobility of computing and communication services between organizational actors bothwithin and across organizational borders. We analyze such environments based on their prevalent features(More)
S the inauguration of information systems research (ISR) two decades ago, the information systems (IS) field’s attention has moved beyond administrative systems and individual tools. Millions of users log onto Facebook, download iPhone applications, and use mobile services to create decentralized work organizations. Understanding these new dynamics will(More)
Received: 23 July 2008 Revised: 1 October 2008 Accepted: 6 October 2008 Abstract We outline a Punctuated Socio-Technical Information System Change model. The model recognizes both incremental and punctuated socio-technical change in the context of information systems at multiple levels – the work system level, the building system level, and the(More)