Reference Hub3
Learning from Patterns During Information Technology Configuration

Learning from Patterns During Information Technology Configuration

Keith S. Horton, Rick G. Dewar
Copyright: © 2005 |Volume: 17 |Issue: 2 |Pages: 17
ISSN: 1546-2234|EISSN: 1546-5012|ISSN: 1546-2234|EISBN13: 9781615200924|EISSN: 1546-5012|DOI: 10.4018/joeuc.2005040102
Cite Article Cite Article

MLA

Horton, Keith S., and Rick G. Dewar. "Learning from Patterns During Information Technology Configuration." JOEUC vol.17, no.2 2005: pp.26-42. http://doi.org/10.4018/joeuc.2005040102

APA

Horton, K. S. & Dewar, R. G. (2005). Learning from Patterns During Information Technology Configuration. Journal of Organizational and End User Computing (JOEUC), 17(2), 26-42. http://doi.org/10.4018/joeuc.2005040102

Chicago

Horton, Keith S., and Rick G. Dewar. "Learning from Patterns During Information Technology Configuration," Journal of Organizational and End User Computing (JOEUC) 17, no.2: 26-42. http://doi.org/10.4018/joeuc.2005040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper asks how people can be assisted in learning from practice, as a basis for informing future action, when configuring information technology (IT) in organizations. It discusses the use of Alexanderian Patterns as a means of aiding such learning. Three patterns are presented that have been derived from a longitudinal empirical study that has focused on practices surrounding IT configuration. The paper goes on to argue that Alexanderian Patterns offer a valuable means of learning from past experience. It is argued that learning from experience is an important dimension of deciding “what needs to be done” in configuring IT with organizational context. The three patterns outlined are described in some detail, and the implications of each discussed. Although it is argued that patterns, per se, provide a valuable tool for learning from experience, some potential dangers in seeking to codify experience with a patterns approach are also discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.