.nfafikhi to... s. . i ... )Lr. . _ < rv! 1H. Ni .5: 5 . ‘ I. .2? r... . . .u. El. 55.. HF . .- Sumw. ‘ ’l. in 3 $31! 1 a... .h Tt-f‘c‘_S:S (“‘- INFORMATION TECHNOLOGY INNOVATION IN THE U.S. Date 0-7639 BIERAR LZLLLZLLLLLL ILLLLLLLLLLLLLLLL LIL LL. 321293 017792 LIBRARY Michigan State University This is to certify that the thesis entitled ARMY: THE CASE OF THE ADOPTION, ADAPTATION, AND UTILIZATION OF THE STRATEGIC CRISIS EXERCISE INTRANET presented by LINDA CAROL JANTZEN has been accepted towards fulfillment of the requirements for MASTER OF ARTS degree in TELECOMMUNICATION Leak/Leda Major professor BELLA MODY, Ph.D. April 164 1999 MS U is an Affirmative Action/Equal Opportunity Institution PLACE IN RETURN BOX to remove this checkout from your record. TO AVOID FINES return on or before date due. MAY BE RECALLED with earlier due date if requested. DATE DUE DATE DUE DATE DUE 1/96 chlM.p65—p.t4 INFORMATION TECHNOLOGY INNOVATION IN THE U.S. ARMY: THE CASE OF THE ADOPTION, ADAPTATION, AND UTILIZATION OF THE STRATEGIC CRISIS EXERCISE INTRANET By Linda C. J antzen A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of MASTER OF ARTS Department of Telecommunications 1999 ABSTRACT INFORMATION TECHNOLOGY INNOVATION IN THE U.S. ARMY: THE CASE OF THE ADOPTION, ADAPTATION, AND UTILIZATION OF THE STRATEGIC CRISIS EXERCISE INTRANET By Linda C. J antzen The U.S. Army has undergone dramatic changes in its structure and operating procedures in recent years as a result of the introduction of new information technologies. This study examines the adoption and adaptation of an information technology innovation in a U.S. Army organization. While previous studies have focused on the technologies themselves, this study investigates the process of innovation adoption, with Special attention paid to how the technology and the organization influence each other. Data was collected through direct Observation of the Strategic Crisis Exercise (SCE) intranet, in use in the Center for Strategic Leadership (CSL), located at the Army War College in Carlisle Barracks, Pennsylvania. Semi-structured interviews were also conducted with key leaders, system developers, system maintainers, and users of the intranet. Despite the unique military context, theories and frameworks developed for similar studies of information technology innovation adoption in business organizations were found to be valid with minimal modifications. To Mum and Dad iii DISCLAIMER The views expressed in this report are solely those of the author and do not necessarily reflect the official policy or position of the Army War College, the Department the Army, the Department of Defense, or the United States Government. iv ACKNOWLEDGEMENTS I would like to extend my heartfelt appreciation to my friend and academic mentor, Professor Bella Mody, Ph.D., whose patience, attention, and cheerful assistance made my experience in graduate school successful and enjoyable. Thanks are also due to Lieutenant Colonel Robert Kilmer and Major Matt Cullen of the Center for Strategic Leadership, who thoughtfully and graciously responded to my inquiries and coordinated my visit to Carlisle Barracks. I greatly appreciate the kind assistance of the officers and noncommissioned officers at the Center for Strategic Leadership who took time out from their busy schedules to share their experiences and expert insights with me. Finally, I thank Rhonda Grimm for her inspiration and technical assistance in producing this thesis. TABLE OF CONTENTS LIST OF FIGURES .............................................................. vii LIST OF ABBREVIATIONS...................................... ............ viii INTRODUCTION .................................................................. 1 Chapter 1 RESEARCH OBJECTIVE .......................................... 6 Chapter 2 LITERATURE REVIEW ......................................... 14 Chapter 3 RESEARCH METHOD ........................................... 45 Chapter 4 FINDINGS ........................................................... 53 Chapter 5 CONCLUSIONS ................................................... 80 LIST OF REFERENCES ....................................................... 87 vi LIST OF FIGURES ROGERS’ PARADIGM OF THE INNOVATION PROCESS IN ORGANIZATIONS ................................................................... 19 SCE 97 INTRANET DESIGN ....................................................... 59 vii AGIS AI C2 CINC CSL DISA F EMA GCCS HTML 113 LEADCT MSEL NGB OLE SCE SNN STD SWAMI LIST OF ABBREVIATIONS Analysis and Gaming Information System Artificial Intelligence Command and Control Commander in Chief Center for Strategic Leadership Defense Information Systems Agency Federal Emergency Management Agency Global Command and Control System Hypertext Markup Language Internet Information System Knowledge Engineering Group Learning Enhancement, Assessment, and Data Collection Tool Master Scenario Event List National Guard Bureau Object Linking and Embedding Strategic Crisis Exercise Strategic News Network Science and Technology Division Strategic Wargame Automated MSEL Injector viii INTRODUCTION The field of organization and innovation research has produced many case studies of businesses that have reinvented themselves. That is, they have undergone drastic changes in their culture, structure, and procedures as a result Of exposure to, adoption, and implementation of information technologies. Indeed, the transformations of a wide spectrum of activities made possible by computer processing and information technology are so profound that they define an age. The Information Revolution now has the status of earlier technological revolutions in agriculture and industry. Small, medium, and large business enterprises in areas like manufacturing, product development, medicine, retail, banking and transportation have found new sources of wealth, not only by mastering vast material resources, but by harnessing ideas and technology. New technologies for collecting, processing, and disseminating information are now developed and placed on the market SO quickly that their adoption and use is considered merely a matter of survival and can hardly be called innovative any more. What interests managers and researchers to a greater extent is the process of adoption and the appropriate meshing of technology with organizational design, processes, strategy, and external relationships (Pennings, 1987). From this point of view, adoption is not the end point but actually just a milestone in a multistage process of innovation consisting of both adoption and implementation stages. Reinvention, in the business sense, is ofien thought of in terms of making planned and profound changes to various activities in an organization. For example, downsizing in personnel can be brought about by replacing people with technology, or by automating previously manually performed tasks. Where information technology is involved, reinvention can apply not only to an organization but to a technology. Pennings (1987), for example, showed that word processing is a flexible innovation that can be reinvented under suitable managerial conditions (see Chapter 3). Innovation is always difficult, but becomes even more complex within a large, bureaucratic organization like the Army. But bureaucracies do innovate, and the question is not whether, but why and how they can change (Rosen, 1991). An organization that has been reinventing itself and reinventing technologies throughout its 224 year history, yet has largely escaped the attention of information technology innovation researchers, is the U.S. Army. The few existing studies of technological innovation in the military focus on the Cold War era development of weapons systems, characterized by product cycles measured in decades, separation of research and development (R&D) and production, and costs in the millions and billions of dollars (Alic, et al., 1992). These vintage models might explain how the Army that emerged from WWI evolved into the modern technological force that faced up to the Soviet Union and defeated the Iraqi Republican Guards in the early 19905. However, they contribute little to the field of innovation in information technology, where product cycles are measured in weeks, R&D and production are integrated, and old hierarchies are being discarded in favor of knowledge-empowered employees. Changes in the global environment and events of the recent past call for a reassessment of the assumptions upon which the traditional models of military innovation are based. In 1991, the Persian Gulf War established new benchmarks for the use of technology in the conduct of war, not just in weapons systems but in information systems that enhanced the Allies’ situational awareness and communication capability. Just 5 years later, the Army reinvented itself to implement the provisions of the Dayton Peace Accords in the former Yugoslavia. In Operation Joint Endeavor, information proved to be a powerful weapon used by U.S. forces to monitor troop movements and detect and react to violations of the Dayton agreement. Another spectacular example of reinvention is the Army personnel drawdown of the 19903, which saw the active component shrink from almost 780,000 to about 480,000, with Similar reductions in the reserve component and the civilian work force. Simultaneously, the Army’s operational tempo, a measure of the degree to which it is committed to perform various missions around the world, increased an astonishing 300% (Reimer, 1998). Success in doing so involved fundamental changes not just in the adoption and procurement of new weapons and management technologies, but in the structure, doctrine, training, and competitive strategy of the organization as well. The achievement of competitive advantage through technology is pursued with no less urgency whether it is a strategic business goal or a matter of national security. In fact, the distinction between the two is getting more and more difficult to discern. In the past, wars were fought for geographic dominance. In the future, national power may be measured by the ability to attain information dominance and the capacity to deprive one’s competitors of information (Pfaltzgraff, 1997, p.9). The information revolution has brought changes in technology as well as a change in the nature of competition, be it global military competition or global business competition. Unlike past innovations that tended to bestow an enduring competitive advantage to the innovator, Information Age technologies tend to be equally accessible to all competitors. The discriminator among competitors in such an environment becomes not the possession of the technology, but the way it is used. The term “Revolution” connotes what George Gilder calls a paradigm shift, or the “collapse of formerly pivotal scarcities,” and “the rise of new forms of abundance” (Gilder, 1997). Applying this concept to the competitive environment of business and national security, technology is the abundant resource, while resources such as time and attention are scarce. Time pressures leaders to make decisions in progress, to react faster than the competition. With the explosion Of data and limitations of human beings to make use of it all, attention becomes a very scarce resource. Again, in Army as well as business organizations, the goal for information technologies is to be designed and used to free up time and attention for more critical and strategic tasks. Accomplishing this requires finding entirely new ways of doing work, not just more efficient ways of doing work the same way. Social science researchers in the past have looked to the military as a “laboratory of social innovation”. For example, when full scale integration of blacks and of women into the military preceded the same level of integration in society at large, Army organizations in particular were studied as a microcosm of what might be seen in society at large. Today, it behooves researchers to see the Army as a laboratory of technological innovation because of the rate at which new technologies are being tested and adopted, and the swift and visible results. Chapter 1 RESEARCH OBJECTIVE In the Army, traditional criteria for assessing the effectiveness of command and control (C2) systems, such as the evaluation criteria identified by Colodney (1995), are based on Army history and doctrine that have in many cases already been superseded by the provisions of the Army’s modernization program. The plan of change, called Force XXI, is so named because it defines a process, the successful completion of which will result in Army XXI, a modern force capable of meeting the challenges of the let Century, in large part through effective use of information. Part of the implementation of that program is evaluation of new commercial information technologies and their effectiveness in enhancing decision makers’ knowledge of the situation. Studies of particular technologies are helpful in evaluating the performance of machines, but are not adequate to explain or assess the complex processes and impacts of the adoption and implementation of modern information technologies. These processes are unique in that their effects are bi-directional. While a tank or an airplane may be used with differing degrees of Skill in different organizations, it remains essentially the same technology and is used with the same tactics, techniques, and procedures between one unit and another. Information technologies are flexible in that the same tool can be modified to suit the mission, and the organization can, under suitable managerial conditions, evolve in its structure and its procedures to optimize the potential of the tool. Overall and intermediate objectives The overall objective of this study was to describe the process of the adoption and adaptation of an information technology innovation within the context of an Army organization. The purpose was not to critique or evaluate the process or the technology, but rather to describe the issues involved in meshing organizational design, processes, and external relationships to the introduction of information technology. This study was intended to link research to a contemporary Situation in an attempt to extend current innovation theory to that Situation. The intermediate objectives leading up to the objective were to first look at the adoption process: the elements of the process, and the surrounding conditions that shape the process including organizational design and culture and the strategic orientation of the leadership. Second, to look at the adaptation of the innovation to the organization: explore its uses and impacts, and how and why the innovation was reinvented. Organization and innovation under study The organization chosen for this study was the Center for Strategic Leadership (CSL) at the Army War College, Carlisle Barracks, Pennsylvania. Though there are many innovations in the process of being adopted or being implemented within the Center for Strategic Leadership, the scope of this study was limited to the intranet and associated internally developed applications used to support the annual Strategic Crisis Exercise (SCE). The exercise is a ten-day, computerized, interactive war game in which War College students put to use the concepts they study in the classroom. Center for Strategic Leadership and War College faculty use communication and computer technologies to create a Simulation of the distributed, collaborative environment of strategic decision makers at the national security level. The SCE intranet, the focal innovation of this study, went into operation for the first time in 1997. Therefore the initial impact of the adoption of intranet technology by the CSL can already be observed. It is also in a constant state of change, or reinvention, in response to new requirements from both inside and outside the organization, making it ideal for a study of this type. Many other organizations within the Army use intranet technology as a way to more effectively accomplish every kind of mission from administrative message distribution to training support to operational and decision support of combat units. The Tactical World Wide Web (TACWEB), an intranet developed and used in the Second (US) Infantry Division in the Republic of Korea, was first selected to be the subject of this study. Lack of adequate time, funds, and the high operational tempo of the Second Infantry Division made it infeasible to do an on-Site study of TACWEB, but documentation as well as conversations with TACWEB developers and maintainers contributed to the formulation of research questions and conclusions in this study. Currently TACWEB and other intranets like it are being assessed mainly by the users, developers, and maintainers associated with them. These intranets and their adoption and utilization within a real operational environment as opposed to a simulation, make interesting subjects for future research. The case of the SCE intranet provides a good starting point for study of technological innovation in a military context because many of the original developers and decision makers are still present at the CSL. Like most other military organizations, the historical evolution of the CSL’S roles and missions are well documented (it is interesting to note that the Military History Institute also resides at Carlisle Barracks). Finally, the CSL and the manner in which they conduct the SCE have a real influence on Army policy. This influence is due to two things: 1) the CSL is an education, research, and outreach organization for the highest levels of the Army, specifically the Army Deputy Chief of Staff for Operations (ADCSOPS), and 2) the conduct of the Strategic Crisis Exercise has a direct and personal effect on the War College students and visiting dignitaries who participate in it, among whom are current and future leaders in the National Security Community. Specific research questions The topic of information technology innovation adoption and adaptation in the Army is vast and largely unexplored. This study is a start, limited time and resources notwithstanding. It addresses the following specific research questions: 1. Why and how did the Center for Strategic Leadership adopt the SCE intranet? 2. How did the Center for Strategic Leadership reinvent the SCE intranet? 3. How has the SCE intranet shaped the organizational structures and processes of the Center for Strategic Leadership? This study is intended to provide a logical basis for, as well as to stimulate interest in doing fiirther research in the area of innovation in the military. It is also intended to illuminate the parallels between the innovation processes of business organizations and modern Army organizations in order to facilitate the sharing of lessons learned on a practical level and theoretical perspectives on a conceptual level. As such, it assumes little or no previous expertise on the part of the reader on the structure and procedures of either business or military organizations. 10 Organization of this study Chapter 2 introduces the reader to relevant organization and innovation literature. Chapter 3 describes the case study method and, protocol used to investigate the process of innovation in the CSL, the use of the intranet in the SCE, the reinvention process including some of the more recent applications developed to supplement the intranet and the impact of the process on the CSL. Chapter 4 presents the findings. Chapter 5 draws conclusions from the research findings and addresses the larger issues that prompted the overall research objective. Audiences The intended audiences for this study are organization and innovation researchers of all disciplines, practitioners of information systems development, management, and implementation, and decision makers in the Army and in business. This research is extremely valuable to each for the following reasons: 1. Researchers seek to develop relevant theory to fill the vacuum of experience created by new technologies. That development requires observations be made in a variety Of different contexts to provide a foundation for predictions of the organizational effects Of new technologies. The Army provides a new technological context, increasingly related to and interconnected with that of business organizations. This study is not an attempt to invent a new 11 theory of innovation, but rather to alter, or at least inform current theory based on analysis of the new context. Further, the same technologies are being adopted and implemented in Army organizations as in business organizations. 2. Information practitioners are faced with implementing into their organizations a Steady stream of new technologies without experience or a theoretical framework to help integrate them. Most computer innovations are not simply turnkey systems where the purpose is well understood and the functions easy to use. Managers as well as developers have to be both technologically sophisticated and adept at facilitating organizational and attitudinal change. Theory cannot provide foolproof steps for successful implementation, but it can contribute to well informed and well managed implementations that will maximize the potential for more effectively achieving organizational goals. 3. Decision makers must be aware of and Skilled at applying different planning and control systems for various stages of the innovation process. Development and adoption of innovations requires experimentation, risk taking, and freedom from bureaucratic control. Yet a degree of strategic control is necessary for successful implementation, guided by monitoring and feedback. Finding an appropriate balance between the two is of particular interest to leaders of innovating organizations. Organizational leaders also seek to understand how they can get the maximum benefit from information without 12 being overwhelmed by it. Increasingly, business and military leaders are expected to be managers of uncertainty. This study and others like it will help to share the experiences and the lessons of organizations who have, successfully or unsuccessfully, adopted and adapted information technologies. 13 Chapter 2 LITERATURE REVIEW An exhaustive review of previous research relevant to all possible aspects of the information technology adoption and adaptation process is impractical and beyond the scope of this study. However, an understanding of existing theory and a review of significant findings from a cross section of the relevant research areas is essential not only as a guide for further investigation, but as a basis for understanding the results of this investigation. Each of the individual views is helpfiJl, but all of them collectively are necessary to provide an adequate basis for a theoretical framework that can be applied to the innovation process in both business and Army organizations. This chapter is divided into the following subsections: 1. Defining Innovation: This section provides a range of views on what an innovation is and how the definition impacts the resulting research effort. 2. Modeling the Innovation Process: This subsection describes how researchers have attempted to model or provide a framework for understanding the innovation and reinvention process in organizations. 3. Applying the Model to Information Technology: This subsection provides examples of how basic models of innovation have been applied to help 14 understand the adoption and adaptation of information technology in particular, including a detailed example of the case of word processing. 4. Innovation in the Military: This section providesja detailed summary of research on innovation in the military by Stephen P. Rosen (1991), a scholar of national security affairs. 5. Barriers to Innovation: This section addresses the political and social forces that may oppose the innovation adoption process, and describes research into how innovative organizations overcome those barriers. 6. Forecasting the Future: This section describes the work of fiJturist theorists and how they have influenced the initiation of innovations in business and military organizations. 7. The Human Dimension: This section describes the perspective that an organization’s members are, as individuals, also affected by and a part of the reinvention process. Defining innovation A meaningful summary of innovation research must begin by delineating what is meant by “innovation”. Rogers defines an innovation as an idea, practice, or object that is perceived as new by an individual or other unit of adoption (1982, p. 11). He later introduced the concept of an innovation-development process, consisting of all of the decisions, activities, and their impacts that occur 15 throughout the development of an innovation, from recognition of a need through adoption of an innovation to address that need (p. 135). Rogers’ primary interest was the diffiision process by which an innovation is communicated among certain populations. This study is confined to one organization and encompasses the initiation and adoption process as well as the reinvention process by which the innovation and the organization both change as a result of their unique combination. Therefore elements of both Rogers’ definitions are applicable. Stephen P. Rosen (1991, p. 7) defines a military innovation as a change in the ideas governing the way a combat organization uses its forces to win. He places emphasis on major changes in organizational structure and doctrine, historically brought about by new developments in technology (nuclear weapons, for example). He describes entirely different innovation processes based on the type of innovation and the context in which they occur. For example, according to Rosen (1991), the process of innovation during peacetime has slightly different elements than during wartime. He also distinguishes between social innovation, which changes the way people behave, and technological innovation, which is concerned with the building of machines (p. 39). Rosen’s theory of military innovation will be discussed in more detail later in this chapter. His work is valuable in understanding the innovation process as it pertains to military 16 organizations, but his distinctions by context or type of innovation make it problematic in making sense of the innovation process within organizations that function in dynamic and competitive environments. Rogers’ definitions apply generically to all types of innovations, including both technologies and techniques for doing things. The type Of innovation this study is concerned with is information technology, a Specific type of technological innovation involved in the creation, storage, or transmission of information. Modeling the innovation process Research in the field of innovations differs in scope and focus. Rogers (1976) and Rosen (1991), for example, looked at the entire process of innovation that starts with identifying the need for a change to solve some problem, and progresses through implementing the solution. One of the earliest and most widely known models of innovation in organizations comes from Rogers’ (1976) research on the innovation process as it pertains to communication in organizations. Rogers’ focus was on communication patterns, and his model of innovation was developed for innovations in products and practices but not Specifically with information technologies in mind. Yet analysis of subsequent models developed for technological innovations Shows that other researchers drew heavily on Rogers’ research, or at least found strikingly similar elements in 17 the process of adopting and implementing information technologies. A summary of Rogers’ process model of innovation is presented here to provide a solid foundation on which to build an understanding of more contemporary models (See Figure 1). Rogers’ assumptions distinguish his model from previous models, which investigated the time of adoption and the frequency of previously adopted innovations as a measure of an organizations innovativeness. Rogers’ four assumptions are (1) innovation iS one of a number of possible responses by the organization to a confluence of external forces acting on it, (2) innovation proceeds through a number of stages, representing increasing commitment by the organization, (3) the process is not unidirectional but interactive, subject to backtracking and change, and (4) one of the best measures of effects of innovation is change in the overall effectiveness of the organization (1976, pp. 155-156). He describes two main stages in the innovation process, initiation and implementation. He also stresses that structural characteristics of an organization, such as complexity, formalization, and centralization may have different effects at different times on the process. For example, Rogers cites Sapolsky’s (1967) argument that high complexity, low formalization, and low centralization facilitate initiation of an innovation, but these same structural characteristics make it difficult for the organization to implement the innovation. 18 ENVIRONMENT POSSIBLE RESOURCE DEMANDS & INNOVATIONS CONSTRAINTS SUPPORTS KNOWLEDGE OF SLACK EXTERNAL INNOVATIONS RESOURCES ACCOUNTABILITY \. L / PROBLEM DEFINITION THE AGENDA OF EXPECTATIONS AND PROBLEMS (PERFORMANCE GAPS) feedback NO CHANGE INNOVATION NONINNOVATIVE l CHANGE EXPANSION OR CONTRACTION —- MATCHING OF ACTIVITIES __. TESTING _ INSTALLATION L __ INSTITUTIONALIZATION Figure 1. Rogers’ (1976) Paradigm of the Innovation Process in Organizations (p. 164) 19 (Rogers, 197 6, p. 156). Therefore, Rogers found, a multistage approach to examining the innovation process was necessary. Even before the first stage in the process of innovation adoption, environmental, structural, and communication factors combine to influence the organization. The problem definition is the process by which the organization defines actual or perceived discrepancies between its expectations and its actual performance. Rogers calls these discrepancies performance gaps (1976, p. 157). Measurement of performance gaps is difficult because they are based largely on perceptions, and thus can be created or disappear as a result of changes in either perceptions or realities. In addition, the effects of performance gaps are bi-directional, that is, a performance gap may inspire a search for an innovation, or alternatively a member’s awareness of a useful innovation may create a perceived performance gap (Rogers, 1976, p. 159). Rogers describes reinvention as distinct from simply importing an innovation from some external source and putting it to use within an organization. Rather, he explains, organizations Often adopt a “general concept whose operational meaning gradually unfolds in the process of implementation” (Rogers, 1976, p. 160). Stated another way, reinvention is the way in which an organization modifies both the innovation and its own organizational structure to fit with each other after the decision to adopt has been made. A number of factors influence 20 the nature and direction of this process beginning prior to the decision to adopt. Rogers divides those factors into four classes: (1) Knowledge of Innovations, (2) External Accountability, (3) Slack Resources, and (4) Organizational Structure (1976, p. 159). Knowledge refers to the awareness of an organization’s members as to what innovations are available and perceptions about the salient characteristics of innovations. Knowledge is influenced by the characteristics of the members and the existence of defined search processes such that members will be exposed to literature or demonstrations of new innovations, either on their own time or while acting as a member of the organization. External accountability refers to the degree to which an organization is dependent or responsible to its environment. Rogers proposes that the higher the degree of external accountability, the more innovative the organization will be (1976, p.160). External accountability also includes a psychological dimension, such as accountability to “reference groups”, or those who “ask the questions that the organization must answer” (Rogers, 1976, p. 160). For example, members of military organizations are accountable to higher ranking members, and military organizations have a well-defined position in a structural hierarchy. Business organizations are accountable to customers and investors. External accountability can also be thought of as the formation of expectations, both specified and perceived, stemming from among other things organizational and 21 professional norms. As with knowledge, the existence and effects of accountability on an organization are influenced by the characteristics of the members and the existence of formal reporting procedures. ‘ While external accountability implies some sort of control of an organization’s activities by outside individuals or agencies, an organization must also exert some degree of control over its environment in order to be innovative (Rogers, 1976, p. 161). Slack resources refer to those resources that an organization controls that are not already committed to other purposes (Rogers, 1976, p. 161). They may already exist or be deliberately created. Like external accountability, slack resources have a psychological dimension as well as a financial dimension. For example, financial slack may be an objective measure such as total amount of budget increase, or it may be more a more subjective assessment as to total amount of discretionary or anticipated fimds. Personnel slack may be an objective measure of total number of employees, or it may be a subjective assessment of how their workload compares with their actual capabilities. Rogers proposes that slack resources are essential for innovation to occur in an organization, and also that a high degree of slack resources may create a perceived performance gap which leads to innovation (1976, p. 162). In the latter case the performance gap comes from the expectation that a responsible organization will maximize their resources and not simply stockpile them. The final factor, organizational structure, refers to 22 the arrangement of components and subsystems within a system (Rogers, 1976, p. 162). Variables such as the degree of centralized control, the existence of formal procedures, and the complexity and openness of an. organization influence the way in which organizations perceive problems, search for solutions, and make decisions. Each of these factors contributes to the formulation of an organization’s agenda, including the decision to develop and/or adopt innovations. However, having become aware of problems or opportunities and having the resources, demand and support structure to implement the innovation process, not all organizations will proceed down the path of adopting and implementing innovations. In Rogers’ model, initiating the innovation process is only one of several alternative responses, along with others like noninnovative change, expansion or contraction of present activities, or no change at all (1976, p. 164). Even afier the decision is made to initiate the innovation process, full implementation of that innovation is not inevitable. Rogers describes the innovation process in four steps or subprocesses: (1) adoption, or matching, (2) testing, or limited implementation, (3) installation, or full implementation and (4) institutionalization, the process of making the innovation an integral part of the organization’s activities (1976, p. 163). Rogers cautions that this process is not unidirectional or uniform. To complete the model, feedback and redirection lines 23 are added to Show that adoption decisions at all stages have a direct bearing on future problem definitions and further innovations. Applying the model to information technology Although it was developed in 1976 and not with computer technology or even automated procedures specifically in mind, a comparison of Rogers’ descriptive paradigm of the innovation process with a more prescriptive methodology for information systems development found in a contemporary textbook shows how theory can inform and influence practice. A generic methodology called FAST developed by Whitten and Bentley (1998) prescribes phases for information systems development. In the survey phase, the project context, scope, budget, staffing, and schedule are established. In the study phase, both the business and technical issues are identified and analyzed for causes and effects. In the definition phase, business requirements are identified and analyzed for the possible technical solution. Candidate technical solutions that might address the business requirements are identified and analyzed in the configuration phase. The target solution is either designed by the organization (design phase) or specified to a vendor (procurement phase). The system is then built and tested in the construction phase, and put into full implementation in the delivery phase. The phases are grouped into three major stages. The first three phases, survey, study, definition, are collectively known as the systems analysis stage. The next 24 three phases, configuration, procurement and design, are known as the systems design stage. The last two phases, construction and delivery, are known as the systems implementation stage. The activities prescribed in the FAST methodology for the systems analysis and design stages of development correspond closely with the matching stage in Rogers’ paradigm, in which the organization matches a problem or performance gap to an innovation believed to address that problem or close the performance gap. The activities prescribed in the systems configuration stage of development correspond to the testing, installation, and institutionalization stages in Rogers’ paradigm. In both cases, the innovation is first partially implemented in order to assess the accuracy of the match and the possible effects, then installed and connected to the activities of the organization, and finally losing the distinction of being an innoVation as it becomes an integral part of the organization’s ongoing activities. Methodologies such as FAST place emphasis on identifying the proper requirements at the beginning of the process (problem definition and matching) and on proper implementation and maintenance of the system at the end of the process (installation, institutionalization, and feedback) as a recipe for success in developing or adopting information systems. Another example of the influence of Rogers’ paradigm comes from Johnson and Rice’s (1983) case study of the reinvention process. Their study 25 investigated the adoption and adaptation of automated word processing systems when such systems were relatively new to offices. Johnson and Rice used a five- stage model attributed to Rogers and others to summarize their data on the process of adopting and adapting world processing systems in business organizations. As with Rogers’ (1976) model, the Johnson and Rice model does not begin nor end with the decision to adopt, but describes an entire process including elements that contribute to the decision, elements of the adoption process, and elements of the reinvention process. The five stages are (1) agenda setting, similar to problem definition, (2) matching, as previously described, the problem from the agenda and the possible solution are brought together, (3) redefining, or defining the attributes of the innovation relative to the organization’s needs, (4) structuring, whereby members establish the innovation within the organization’s structure in the process of reacting or adjusting to it, and (5) interconnecting, whereby political questions about turf, social benefits, control and access are raised and their solutions negotiated or dictated. Johnson and Rice focused on one innovation, word processors, and compared data collected from nearly 200 organizations. They compared not only the features put into use, but also the different patterns of implementation (for example, distribution Of terminals, division of labor, design of work groups, etc.). Their data reinforced the usefulness of the multi-stage model approach and 26 highlighted some additional factors in information system adoption. For example, the initial stage in Johnson and Rice’s (1983) model, agenda setting, corresponds with Rogers’ description of problem definition. As Rogers pointed out, there are multiple factors affecting the problem definition process, including knowledge of innovations, slack resources, external accountability, and organizational structure (1976, p. 159). Johnson and Rice (1983) found from the case of word processing that it was not sufficient to think of agenda setting from a rational perspective. Instead, they found that decision making was multi-faceted and influenced as much by systematic establishment of goals and objective criteria as by human emotion and ideology (Johnson & Rice, 1983, p. 164). In response to their survey and those of others, the rationales given for initial use of word processing were not uses that would change or improve the organization, increase productivity, or save money. The most common rationale given for initial installation of word processors was “repetitive typing” (Johnson & Rice, 1983, p. 165). This suggests that the real extent of the benefits of replacing traditional typewriters with word processors was not foreseen, but would come about later in the process as users and managers became more experienced with the new tool’s capabilities. 27 In the next phase, matching, Johnson and Rice’s data reinforced the importance of top level management support for successful adoption and implementation (1983, p. 164). In addition, they found that the attributes that facilitate adoption during this phase may have the long term effect of either suppressing its potential or generating organizational conflicts in later stages (p. 166). For example, the compatibility, or consistency with the adopter’s prior experience, beliefs, and values, was initially high when word processing was placed into the existing centralized typing pools. By simply automating old work procedures rather than using the new tool to create new, more efficient work procedures, the potential of word processing was suppressed. Communicability, or the visibility of the innovation to potential adopters, was high with respect to the visible results of rapid production, correct fOrmatting and clean copy. Visibility of the higher quality product without a corresponding appreciation for the work involved in producing it had a dual effect in that it led to higher standards for demands on the word processing operators and eventually became the source of tension between requesters of word processing services and operator capabilities. Another attribute, divisibility, was not a strength of the word processing systems in Johnson and Rice’s study. Introduction of word processing equipment tended to be large scale rather than incremental. However, as with compatibility, efforts to keep initial systems 28 simple also worked against developing managerial and employee expertise needed in later stages (Johnson & Rice, 1983, p. 166). The case of word processing went beyond the stages of innovation adoption, and produced interesting findings related to the reinvention process as well. Johnson and Rice define reinvention as “the degree to which an innovation is changed by the adopter in the process of adoption and implementation after its original development” (1983, p. 169). They stressed that reinvention can occur at any of the five adoption stages. They categorize reinvention into planned or vicarious (intentional versus learning from other’s mistakes), and reactive or secondary (solving a problem generated by the innovation versus solving unintended consequences brought on by reinvention) (Johnson & Rice, 1983, p. 170). Recall that reinvention is the process of adapting an organization to an innovation and vice versa. No case study of adoption is complete without following it through the reinvention process, as the consequences of this process will certainly affect future adoption processes. Johnson and Rice noted that management and innovation practices have a direct impact on organizational effectiveness, successful accomplishment of organizational mission, and perhaps even redefinitions of that mission (1983, p. 176). They observed word processing technology, procedures, and operators in multiple organizations and found that the technology had taken on what they 29 considered to be different forms as a result of the different managerial conditions and different decisions made throughout the adoption and reinvention process. Each form exhibits increasing amounts of reinvention. In the first form, Low Integration, word processors were used as typewriters, with minimal understanding of, or appreciation for the capabilities Of the technology (Johnson & Rice, 1983, p. 176). In the next form, called Standard Adapter: Clockwork Systems, emphasis on short term efficiency creates a reluctance to get new equipment or develop new procedures. Attention is placed on quantity rather than quality of output (Johnson & Rice, 1983, p. 177). In the next form, Expanding Systems: Supervisory Reinvention, applications evolve and functions are added frequently. Supervisors motivate change and put a premium on fast results. They invest in reinvention, and have a Significant influence on the attitude of their subordinates (Johnson & Rice, 1983, p. 178). The final form, High Integration: Systemwide Reinvention, differs from Expanding Systems in that word processing was managed rather than supervised. Supervisors and operators cooperated in system development and operation, with a willingness to accept risk and uncertainty in order to experiment and learn (Johnson & Rice, 1983, p. 179). While the latter form, High Integration, appears to be the most desirable for innovation to thrive, it is not always possible or desirable for every type of organization. 30 The importance of Johnson and Rice’s (1983) findings was not to prescribe a recipe for successful innovation, but to illustrate the fact that managerial conditions as well as the participation of those close to the work process can shape both the innovation process and the consequences of it on the organization and the innovation. Innovation in the military Few theoretical works can be found that focus on the process of innovation in the case of military organizations. Stephen P. Rosen’s analysis, Winning the Next War: Innovation and the Modern Military (1991), is one of the few. Its weakness is that it used mainly historical examples to illustrate and evaluate the innovation process. History does in fact provide many insights, but it is difficult in hindsight to accurately assess the conditions that led to decisions and their outcomes. Examples of past successes or failures are useful to understanding the evolution of the process, but they are inadequate as predictors or measures of current models. Nevertheless, many elements of his work are useful for understanding the current process of innovation in Army organizations. These elements are examined here in some detail. Rosen (1991) proposes that bureaucracies, large organizations with well defined procedures and centralized control, are not hard to change, even though they are actually designed not to change. Bureaucracies, including the military 31 services, do innovate and change. The question, then, is why and how do they change (Rosen, 1991, p. 3). Rogers agreed with that observation, stating that bureaucracies, which rely on stability for their efficiency, lose that efficiency when rapid change is introduced (Rogers, 1976, p. 149). Yet innovation and change are a regular part of most organizations, including bureaucracies. Another paradox brought up by Rogers (1976) is that the same structural characteristics of an organization that work to facilitate the innovation adoption process later work against the implementation process. He suggested that this problem might be solved if organizations could adapt a dual structure: complex, informal, and decentralized to initiate innovations, while on the other hand low in complexity, formalized, and centralized in order to facilitate implementation (Rogers, 1976, p. 156). If a bureaucracy can be designed for stability and yet adapt itself to accommodate and even to initiate the process of change, perhaps therein lies a clue to creating an organizational structure that could facilitate both initiation and implementation of innovations. Rosen’s work takes a first step in addressing this issue by focusing on one very large and stable bureaucracy, the military. Rosen describes the innovation process differently based on whether it occurs in peacetime or wartime, and whether it is a social behavior innovation or a technological one (1991, p. 7). In peacetime, he says, the impetus for innovation can come from a previous catastrophic defeat or from civilian 32 intervention. Peacetime innovation requires a redefining of values through an ideological struggle over what the next war will look like and how it must be fought to be won (Rosen, 1991, p. 20). This ideology is then transformed into legislation or new tasks, missions, and performance measures for the military. The actors in this scenario are primarily senior military officers. Unlike a Chief Executive Officer of a civilian organization, the senior leaders of the military all come from the ranks. This creates a unique power structure in which diffusion of new ways of doing things comes about very effectively through the creation of new promotion pathways that incorporate the new tasks and performance measures. Civilian intervention can play a part in this process, primarily in the role of reinforcing the senior officers or protecting military innovators against opposition (Rosen, 1991, p. 21). In his discussion of wartime innovation, Rosen (1991) introduces the concept of feedback in the innovation process. Improving performance of existing tasks is difficult, but learning entirely new tasks is even more difficult under wartime conditions, when time and the availability and reliability of information may be extremely limited. Even under these conditions, feedback can enable reform of certain practices, something that is short of actual innovation. Real innovation becomes necessary when the feedback, or intelligence, lies outside of established categories, or when an inappropriate strategic goal is being pursued. 33 Stated another way, innovation is required when the old ways are being performed well but not winning the war (Rosen, 1991, p. 35). Wartime innovation can proceed from wartime learning, but learning must go beyond improvement in existing routines. Rosen observed from the cases of the British tank, the American submarine force, and the strategic bombing force of WWII that wartime innovation proceeds from wartime learning. In each case, new strategic goals were defined rather than pursuing Old ones. Thus, in wartime, real improvement in effectiveness for a military organization stems not only from the selection of appropriate strategic goals, nor even from the way it conducts operations, but from the proper definition of what and how it Should be learning from its wartime experiences. The more traditional type of innovation usually associated with the military is the building of machines, or weapons. But even this type of innovation has a political component, the recognition of which can shed light on the development and adoption of any technological innovation including both weapons and information technology. Rosen first addresses the misconception that military technological innovation comes about as a result of objective knowledge about enemy capabilities. He found from historical accounts a pattern of both peacetime and wartime research and development (R&D) surprisingly divorced from intelligence about enemy technology (Rosen, 1991, p. 187). Current 34 innovation decisions have been and are likely to involve the more complex question not of what capabilities the enemy has today, but what major competitors are likely to have five to ten years in the future. Rosen discusses the role of demand and the historical role of scientists in his discussion of technological innovation in the military. The ideal way to decide what technologies to develop is the business approach - estimate future costs and their anticipated benefits. Actual costs Of research and development of military technology are highly uncertain because contributions in the effort come not just from within the military but from the collective resources of universities, research labs, and industry. The value yielded from military technology is just as difficult to calculate: how does one measure political and military power or the value of deterrence? The relevant question is what strategies to develop for coping with these uncertainties (Rosen, 1991, p. 53). In Rosen’s analysis of the historical role of scientists in military innovation, he found one view that new ideas for weapons systems come from scientists and engineers and rarely from within the military. Further, this view charged, the military was not even adept at selecting from commercially developed technologies and adapting them for military use (Rosen, 1991, p. 222). Prominent scientist and advisor to the President, Vannevar Bush, argued in 1945 for letting scientists become familiar with the needs of the military, and then proceed with 35 research independent of military interference (Rosen, 1991, p. 228). This view was valid on its face. Soldiers are trained to make snap decisions with inadequate data, while researchers supposedly know better. Military organizations tend to follow the bureaucratic imperative of self preservation, resisting the introduction of new technologies that lie beyond their existing areas of expertise (Rosen, 1991, p. 231). Once again, however, Rosen’s detailed analysis of historical cases served to contradict the assumptions and reinforce the paradox. Rosen found no evidence that bureaucratic pathologies had caused the military to neglect available technologies, nor was there evidence that technological innovations had come about due to the exclusive efforts of either the military or the civilian scientific community. Rosen concluded that successful innovations are initiated as often during periods of constrained resources as during times of growing budgets. Rather than money, he found, the key to innovation was talent, time, and information (Rosen, 1991, p. 252). Intelligence about the behavior and capabilities of the enemy was only loosely connected to peacetime, wartime, or technological innovation. Innovation is more closely linked to predictions about changes in the security environment that are based on economic, technological, and political factors outside the control of the US or its potential competitors. Successful, useful innovations, Rosen asserts, have an intellectual basis determined by 36 environmental factors that are independent of fluctuating policy decisions (1991, p. 254). Finally, Rosen recommends the best technique for managing uncertainty is the “low cost hedge”: emphasis on research and development (R&D) and on simulated warfare on a range of new technologies and mobilization plans for mass production rather than large scale procurement of any one system. It is more effective, he says, to buy information and defer construction until a new strategic requirement is defined (p. 259). Another interesting finding put forth by Rosen is that he found no clear cut cases of “bad” innovation in the US Military. Mistakes appear to have been the result of failure to innovate rather than inappropriate innovations (Rosen, 1991, p. 53). Barriers to innovation Models Of innovation and other complex processes seek to demystify and to provide a certain degree of structure and predictability to the dynamics of organizational behavior. As Johnson and Rice (1984) pointed out, the rational perspective on the adoption decision process fails to account for emotional, psychological, and political factors acting on the decisionmaker. Johannes M. Pennings (1987) examined some of the factors that tend to inhibit the process of innovation, including observable but unexplained reluctance on the part of some managers to exploit the opportunities new technology can bring. An understanding of the factors inhibiting adoption or adaptation of innovations 37 may contribute as much to the decisionmaking process as understanding the factors that facilitate them. Pennings (1987) described the phenomenon of behavioral inertia as “a tendency to persist in a pattern of learned behavior that has become established, even in the face of rather strong temptation to abandon or change it” (p. 57). As a heritable trait, the effects of behavioral inertia will manifest differently in different people and in different groups, adding a subconscious, seemingly unpredictable element to the decision making process. In terms of innovation connected with new technology, says Pennings, “either the benefits of change or the cost of inertia must be extremely powerful before adoption will occur” (1987, p. 19). Inertial forces may have a greater impact on radical adoptions, where sweeping changes are swiftly introduced into an organization and the people are unfamiliar with the technology. The impact on acceptance of the new technology is likely to be fragmentation, delay, and interruption (Pennings, 1987, p. 214). Pennings (1987) found that innovative organizations did not overcome strong emotional barriers per se, but treated them as part of the common, ordinary routine of individuals and of the organization. In his Routine Change model, Pennings introduced several submodels of what he called ordinary routines that can lead to adoption as part of simply the “normal flow of things” (1987, p. 20). He emphasized that these submodels were not determinants of innovation, but instead a way of understanding adoption in 38 terms of the unfolding of a host of standard operating procedures. For example, an organization may follow defined search routines as part of its problem- solving model and discover new technology as a solution to problems. New technologies may be perceived as critical for market survival and adopted as a result of a routine scan of the capabilities of the organization’s competitors. The organization may adopt on the advice of consultants or in response to demands by clients or customers. Accepting that organizational routines can mitigate behavioral inertia and promote innovation leads to a host Of possible strategies for formulating technological policies, such as maintaining openness to the environment, tracking and forecasting technological trends, and making structural adaptations like creating unique position, teams, and mechanisms for implementing new technologies (Pennings, 1987, p. 214). Forecasting the future AS illustrated above, innovation adoption and development decisions come about in many ways. Rational analysis of organizational requirements is but one of them. Factors such as knowledge of innovations, slack resources, and external accountability (see above) focus on the ability to see, understand, and respond to the environment as it exists today. But success in the competitive business and security environment requires the ability to anticipate the requirements of the future. Business and military leaders alike seek not to merely 39 keep up with their competitors but to stay ahead of them. The perception of necessity may come about more from a vision of the future rather than from some measurable observation or economically calculated value. Contributing to that vision are knowledge of emerging technologies and how they are intended to be used, as well as an informed and enlightened conception of the environment or context in which these technologies will likely be developed and implemented. Several scholars have sought to describe the future environment and how it will influence the direction and nature of future technologies and ways of using them. Futurist views have had a great impact on military doctrine and strategic business goals, and thus have contributed to decisions to initiate development of new technologies. For example, an Army doctrinal publication, Training and Doctrine Command (TRADOC) Pamphlet 525-5, Force XXI OperatiOns. (1994) lists in its references the works of futurist theorists Alvin and Heidi Toffler. Force XXI Operations describes the conceptual foundations for the conduct of future Army Operations in war and in operations other than war involving Force XXI, the US Army of the early twenty-first century. The purpose of the document is to provide a basis for development of supporting concepts, programs, experiments, and initiatives, many of which have already begun. According to Alvin and Heidi Toffler (1993), historical epochs or waves of socioeconomic change are brought about by revolutionary technological 4O change. The first (agrarian) wave was characterized by animal domestication and agricultural cultivation, the second (industrial) wave by mass production and mechanization, and the third (information) wave by digitization, computers, and information technologies. The effect of these socioeconomic developments has been to alter the world economy and the goals of military strategy. If the analogy holds, then information is the new basis of power. For example, companies can achieve competitive advantage and thereby make more money through the effective use of information. The Army can control the terms and progress of battle by maximizing the ability to collect and process relevant intelligence and transmit directives while denying this capability to competitors. Another futurist theorist, George Gilder, describes socioeconomic change in terms of “paradigm shifts” (1997). He explains that “the key to paradigm shifis is the collapse Of formerly pivotal scarcities, the rise of new forms of abundance, and the onset of new scarcities. Successful innovators use these new forms of abundance to redress the emergent shortages” (Gilder, 1997). Returning for a moment to Johnson and Rice (1983) information technology creates new information pathways and makes information flow more efficient (p. 158). The very scarce resource in organizations is attention. Information systems should therefore be designed to free up this scarce resource for more crucial tasks than prioritizing, filtering, and editing the flow of information. This requires new ways 41 of doing work, not just more efficient ways of doing the same work. This example illustrates how a vision of the future environment can be an impetus for innovation in technological and organizational design. The human dimension of innovation Reinvention of organizations involves a transformation in the design and strategic goals of the organization, but must also include some corresponding transformation on the part of the people who make up the organization. The human dimension is often mentioned in innovation literature, but research on the effect of new technology on social and cultural change is difficult to find because the results tend to be incomplete or inconclusive until the technology has been in use for a long period within a population. But theories and opinions abound about the effect of the Information Age on human conceptual behavior. Army Colonel Paul T. Harig (1996) postulated that “complexity of life may produce corresponding changes in complexity of mind”. He explained that the explosion of information had transformed the meaning of the concept of expertise. In the past, an expert was a repository Of facts. Today, an expert is defined by the ability to efficiently find and manipulate data, to recognize patterns and integrate new facts from data without being overwhelmed by it. If the power of computers is in the ability to imitate human intelligence, the power of humans to use computers may require that they adopt a sort of “digital 42 thinking” pattern, while still retaining the very human traits of intuition, risk- taking, and creative thinking. Pennings (1987) observed what he called the gap between the technically possible and the organizationally realizable (p. 77). He also applied the concept of a “cultural lag” to information technologies, where changes in technology move much faster than the culture (collective values, beliefs, ways of doing things). DO the demands of the Information Age now require leaders to be technology experts? Do technology experts need to master social and political Skills? As an organization is reinvented, what transformations occur in its members or future members? Pennings (1987) described the “role of boundary spanning individuals’, stating that professionals would need social change skills, complimenting their exclusive expertise, to modify beliefs, ideas, and values so that these will fit the imminent technology of their organizations (p. 213). Walter B. Wriston, former Chairman and Chief Executive Officer of Citicorp/Citibank, and former Chairman of the Economic Policy Advisory Board in the Reagan administration, wrote, “an expert is a person with great knowledge about a legacy system” (1997, p. 181). Henry Kissinger (1994) observed “It is, afler all, the responsibility of the expert to operate the familiar and that of the leader to transcend it”. It would seem that the need for both “experts” as well as managers and leaders is as important as ever, but the roles and expectations of 43 both may be significantly different in the Information Age. Recognition of this fact is already written into Army doctrine and into the curriculum at the Army War College, an academic and research institution for educating the nation’s senior strategic leaders. For example, among the attributes identified as crucial for the senior commanders and staff in the Army are direct references to managing and responding to change, leading in “learning organizations”, fostering a determination to innovate, facility in managing an avalanche of data, exercising “enlightened control”, and hands-on skill on computers (Chilcoat, 1995). The reinvention process for members of military and business organizations may well begin with the integration of Information Age concepts into educational curricula. The common thread throughout the many approaches to innovation and reinvention research examined here is the certainty of change and the need to prepare for and adapt to it. Organizational structures, work, and people must be changed, and information technology is both a cause of and a tool for change. 44 Chapter 3 RESEARCH METHOD This study describes how an Army organization innovates. The focus iS on contemporary, real life events that are dynamic and ongoing. The preferred strategy in this case is the case study method, relying on direct observation and systematic interviewing. Case study methodology This research follows a case study protocol appropriate for the single case (embedded) design as described by Yin (1989, p. 46). The rationale for the Single case design is twofold. First, the case of the Center for Strategic Leadership’s Strategic Crisis Exercise intranet is revelatory in the sense that the investigator had a unique opportunity to observe a process that is not inaccessible, but very difficult for Similarly situated investigators to explore in detail. The investigator’s status as an active duty Army Officer with a security clearance gave her access, and her experience in planning, operating, and maintaining information technologies within Army organizations gave her a basis from which to construct appropriate interview questions and apply appropriate theory. Second, a Single case study is necessary due to resource constraints. The intranet technology adopted by the Center for Strategic Leadership is widely available and is used by many other Army and business organizations. A study of multiple cases would be very valuable and the 45 investigator invites other researchers to do so. This study should be treated as foundational. It establishes the relevance of studying adoption and reinvention of information technologies within the context of the U.S. Army, and the applicability of existing theory to this unique Context. Unit of analysis The overall unit of analysis in this study is the Strategic Crisis Exercise (SCE) intranet, adopted by the Center for Strategic Leadership (CSL) in 1997. Within this larger unit of analysis lie several subunits. For example, in order to construct a coherent description of the overall process of adoption and the subsequent reinvention of the SCE intranet, it was necessary to examine the effects of related and intermediate processes and the perspective of different individuals. Each of these stages could be considered as a process in itself and each. contributes to the overall process of innovation. Interview development With no prior knowledge of the CSL or the SCE intranet, the investigator drafted interview questions based on Rogers’ stages of the innovation process in organizations (Rogers, 1982, p. 363). The two main stages identified by Rogers (1982) were 1) Initiation, and 2) Implementation (see Chapter 3). Within the initiation stage, the intermediate processes and relevant questions related to those processes were as follows: 46 a. Agenda setting: What was the original intent for the SCE intranet? What was the problem it was intended to solve, or the directive or opportunity it was intended to address? b. Matching: What benefits were expected to be gained from the use of the SCE intranet? What problems were expected? What were the barriers and facilitators to the final decision to adopt the SCE intranet? What were the risks? Within the implementation stage, the intermediate processes and relevant questions related to those processes were as follows: a. Redefining/restructuring: What modifications were made in the SCE intranet to make it fit the organization? What modifications were made in the organization to fit the SCE intranet? b. Clarifying: How was the SCE intranet introduced for Wide use? What were the results, both intended and unintended? c. Routinizing: How is the SCE intranet currently used? Has the use of the SCE intranet been initiated for any new activities since its adoption? Has it been discontinued for any activities? This use of Rogers (1982) framework proved very useful in identifying the appropriate individuals to interview and guiding the conduct of the semi- structured interviews. Interview respondents Individuals interviewed for this study were categorized into four groups: 47 System Developers (SD) — those who originally conceived of and designed the system. This category includes systems analysts, programmers, contractors, etc. System Maintainers (SM) — those who currently maintain the network and make modifications to it in response to mission requirements. This category includes signal (information management) staff, system administrators, etc. Kej Leaders (KL) — the system “owners” who either directed that the system be developed or approved the system as a solution. This category includes the Director of the CSL, the Commandant of the Army War College, etc. System Users (SU) — those who use the system to accomplish their mission, including students and controllers participating in the Strategic Crisis Exercise. Although each respondent consented to be interviewed and quoted, confidentiality is maintained in this report by referring to respondents only by their respective category (SD, SM, KL, or SU), and a number (e.g., SDI, SD2 refer to System Developer 1, System Developer 2, and so on). Prior to the interviews, questions were formulated based upon the processes described above, and tailored to the specific categories of individuals identified here. With the help of a CSL staff officer, respondents from each Of the categories were identified and permission to interview Obtained. The actual questions asked in the interviews differed from the draft questions 48 where necessary to pursue unexpected issues raised by the respondents, but the draft questions provided an excellent interview guide for the investigator. The respondents were chosen based on their qualifications as system developers, maintainers, users, and key leaders as described here. Another important selection factor was respondent availability. The investigator was limited to a four day, on-site visit for observing the SCE intranet and conducting face-to-face interviews. A total of five SDS were interviewed, consisting of four active duty Army officers and one Department of the Army Civilian. Three SMs were interviewed, consisting of one active duty Army Officer responsible for the procurement and proper functioning Of the hardware and software associated with the intranet, and two responsible for programming patches and modifications. Five KLS were interviewed, consisting of four active duty officers responsible for running the SCE, as well as one Reserve officer responsible for data collection during the SCE. Two SUS were interviewed, consisting of active duty officers who participated in the SCE as Army War College students. Ideally, additional users would have been interviewed to include the controllers who use the intranet to initiate the events that drive the exercise, and observers who Critique the response of the students and conduct after action reviews to help students learn from the experience. Since it was not possible to observe an actual SCE in progress, the perspective of the controllers was represented by the KLS who run the SCE and supervise the controllers. 49 Observation In addition to on-site interviews, the investigator used additional sources of information including direct observation of the SCE intranet features, its look and feel, and its functionality. In general, an intranet is characterized by the use of Internet technology to provide many of the same functions to a specific organization as the Internet does to the general public. The technology consists of, but is not limited to, Web servers, Web browsers, and hypertext- based applications. The functions include electronic access to information, single user interface to various computer applications, and hardware independent delivery. The attraction of Army and business organizations to intranets is the cost effective and timely approach to the distribution of information. Other sources of information used by the investigator were information papers and briefings generated by the CSL, archival records and journal articles written by CSL and Army War College personnel, and various government Web Sites giving background information on Army doctrine, training policy, and information management policy. The investigator’s personal experience as officer-in-charge of communications and automation on the staff of a large Army training center also contributed to the way in which data was collected and interpreted for this case study. This may be seen as a source of bias were this study an evaluation of the SCE intranet or the innovation process of the CSL. However, as stated previously, this study 50 is not evaluative but descriptive. Therefore, the investigator’s background does not add a bias but instead improves her ability to act as an “expert observer” and provide an accurate description and a meaningful analysis of the process. L Data analysis Rogers’ (1982) model aided both data collection and data analysis. Data analysis consists of examining, categorizing, tabulating, or otherwise recombining the evidence, to address the initial propositions of the study (Yin, 1989, p. 105). The mode of analysis used for this study to address the initial research questions was a variation of the pattern-matching technique (Yin, 1989, p. 109). A predicted pattern was based upon Rogers’ model of innovation adoption and Rice’s framework for reinvention (see Chapter 3). The findings of the case study helped to validate certain elements of these models when applied in the context of an Army organization, and provided the basis for an alternative model to be fully developed and validated by further study. External validity External validity establishes the domain to which a study’s findings can be generalized to other cases (Yin, 1989, p. 43). It should be stressed that the findings of this study are not generalizable in a statistical sense. That is, a sample of one case of innovation in one Army organization does not readily generalize to apply to all cases of innovation in all Army organizations. The 51 innovation of intranet technology is common in many Army organizations but the Center for Strategic Leadership is unique in its mission, structure, and available resources. External validity in this case relies on analytical generalization. in which a particular set of results generalize to some theory (Yin, 1989, p. 43). The evidence in this case was carefully analyzed to show consistency or inconsistency with existing theory described in Chapter 3, thereby providing a theoretical basis for further research in other Army organizations. 52 Chapter 4 FINDINGS This chapter describes the subject organization, the organizational mission that the innovation is intended to address, the innovation itself, and how the innovation is used in support of the mission. Following a description of the organization and the innovation of interest, answers to each research question (see Chapter 1) are presented based on interviews, briefings, Observations, published reports and other archival data. The Center for Strategic Leadership The Center for Strategic Leadership (CSL), located on the grounds of the Army War College at Carlisle Barracks, Pennsylvania, is the U.S. Army’s strategic education center where senior military officers and goVemment civilians are schooled in the art of strategic thinking and decision making. The resources of the CSL go toward education and research focused on the decision making process at the inter-agency, national, and strategic level. Its mission of education, research, and outreach support the senior leadership at the Department of the Army, combatant commanders around the world, and the Army War College. The activities of the CSL include support for strategic level political-military simulations for Army War College students, support of Army Staff and Joint Staff exercises, and conduct of interagency 53 education and training. The Strategic Crisis Exercise (SCE) is one of the activities the CSL conducts in support of the Army War College curriculum. The Strategic Crisis Exercise The Strategic Crisis Exercise is an annual, ten-day, computer-supported, practical exercise in which students of the Army War College are able to integrate and apply the knowledge gained during the academic year through experiential learning. The SCE has been conducted at the Army War College since 1995 with the opening of the Center for Strategic Leadership in Collins Hall. Students form cells representing government and military agencies at the national level, such as the National Security Council, Department of Defense, the Department of State, the Department of Commerce, the Joint Staff, and geographic Commanders-in-Chief (CINCS). Faculty and subject matter expert participants take on roles such as military and goVernment staff elements, National Guard Bureau (N GB), Federal Emergency Management Agency (FEMA), the Surgeon General, members of Congress, and media representatives. By visiting or using remote access, guest participants like members of Congress or CINCS will participate as themselves and provide realism for the exercise and mentorship for the students. The cells are physically separated from one another to simulate the real life distances between the agencies involved. Communication between cells is also realistically accomplished through video teleconferencing, telephone and conference calls, and e-mail, for example. The SCE scenario is set nine to 54 eleven years in the future, when the current students might be Generals serving in key political and military positions. It is conducted with 320 War College Students as players, 150 faculty as observers and controllers, and invited guests who act as observers, players, and mentors. The mission of the CSL is to provide exercise participants with information technology tools that approximate those they might encounter in the future, many of which are enhancements to existing technologies that are already in progress. It is up to the leaders and developers in the Science and Technology Division (STD) of the CSL to keep up with technology trends and to come up with their version of current and upcoming technologies for use in the SCE. They cited the Internet as the most important source of information to keep current on both military and commercial developments. As recently as the early 19905 they would have been limited to the information they could take in through volumes of printed publications that may be out of date by the time they were delivered. With the aid of the SCE intranet and other automated tools, the exercise controllers create an environment intended to stress students’ analytical and decision making skills. Participants are presented with a series of crises occurring in the U.S. and all over the world including armed conflicts, natural and manmade disasters, peacekeeping and peace enforcement missions. They then decide on the appropriate employment of national military, economic, and political power in response. This must be done within the limits of 55 available resources (also managed by computer), such as the availability of active duty and reserve military forces and of strategic airlift, etc. The exercise scenario is written to depict realistic situations and present a logical progression of events to which the participants, role-playing as military generals, national security decisionmakers and advisors, must react. The scenarios are sufficiently complex to require the participants to use the information gathering, decision making, and collaborative skills spelled out in the learning objectives for the exercise. The SCE Intranet For purposes of this study, SCE intranet refers to that portion of the CSL local area network that is used for internal access of students and faculty participating in the SCE. It includes the physical network, Web server, database server, and browser interface. Certain separate applications that support running, playing, and controlling the SCE and are delivered via the network are covered also, although technically they are currently not a fully integrated part of the intranet. This study was only concerned with the development and use of the intranet as a solution to the requirements of the SCE mission, although the use of the intranet is not limited to the features and functions discussed here. Just as the National Information Infrastructure (N 11) is the nervous system of real-world crisis action, the information infrastructure supporting the facilities of the CSL are the nervous system of the SCE. At Collins Hall, the 56 building where the CSL is housed, a portion of the N11 has been replicated as closely as possible using state-of-the-art information and communication technologies. The new facility provides rooms equipped with visual information support, access to two local area networks (one classified and one unclassified), over 400 PCs and Sun SparcStations, video-teleconferencing capability, printers, large monitors, telephones with internal and external lines, Whiteboards and world maps. Internet/intranet technology is considered one of the most important means of information sharing in the future environment of the SCE. An intranet provides a networking environment with the browser providing a standard software interface to numerous files, applications and databases. Intranet management software allows users to post information as simply as copying a file to a disk drive. Hence the attraction of intranet technology to all types of organizations: accessible technology with a familiar interface and user friendly interactivity. Because a majority of participants are experienced in using the Internet, the SCE intranet meets the requirements of the CSL’S automation architecture design philosophy. As stated in a CSL monograph entitled “Simulating the Future: Automated Tools for Strategic Wargames”, the goal is to Show the students something new, but not to make them spend their time learning how to push new buttons at the expense of strategic thinking, crisis action planning, and the interagency process. 57 The SCE intranet was designed to support the student/players, faculty/controllers, and guest participants with tools for driving the scenario, gathering information, making decisions, and issuing responses. Previous to the adoption and implementation of the intranet, all of these functions were done manually, with text-based e-mail support, paper copy messages, and with volumes of reference books. The intranet was, as of 1997, comprised of four main sections (see Figure 2): 1) Administrative, containing information about visitors, announcements, schedules, and other notices that fall outside the gameplay. 2) Controller Guide, containing exercise control information that is visible only to the controllers. 3) Student Guide, containing reference information and tutorials for the students. External agency homepages are downloaded and modified to correspond to the scenario for students to Obtain data from realistic looking sources. 4) SCE Scenario, containing actual exercise data, including world summary information, maps, news, plans, and intelligence updates. The system used intranet “cookies” to control which information each student desktop can access. For SCE ’98, the security control features provided by the Netscape server software ensured that the appropriate information was delivered electronically to the correct participants. For SCE ’99, the CSL changed the standard browser from Netscape Navigator to Microsoft Internet Explorer, utilizing the security features of Microsoft NT and Internet Information Server (11$). 58 ESE one: I cwwmoQ Bambfi mom .m 22w; 5:8 Bwofibm 1.. zoom .1 300m tmEm 5:05:09 M23 Oni— lr 9609 $3 550230 1203 cognanU Sen EEO COSNEOMC~ mWEH—ooz 8.50m EEO .l lfloo... cmonm mLEEooczocc’x ecsocwxomm l I 02885 mom E2335 2.83 anmmdm F oracoom mUm 02:0 “seesaw 02:0 5:05:00 # _ mEoEEoU =m: 3:60 com muoflcoURo—qi L Esconom Se; Bgosom 1 ram mLEEoocsocc< ran SEE. _ H.&Z