Sharing Knowledge in Technology Deficient Environments: Individual Workarounds amid Corporate Restrictions

Robert M. Davison, Carol XJ Ou

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

23 Citations (Scopus)
48 Downloads (CityUHK Scholars)

Abstract

In this paper, we draw on socio-technical theory to explore how Chinese professionals engage in informal knowledge focused activities facilitated by guanxi networks in the face of restrictive corporate IT policies. Following a short review of the global and Chinese literature on knowledge management and knowledge sharing, we describe our qualitative investigation into the informal work practices of employees in 16 China-located hotels of Ravine, a global hotel chain. These work practices include the development and maintenance of guanxi (relationships) with internal and external colleagues, and the leveraging of this guanxi in order to exchange information and knowledge. We document both the corporate IT restrictions and the workarounds that employees deploy as they strive to complete their work effectively. We discuss the theoretical and practical implications of the research findings before concluding with recommendations for research and practice.
Original languageEnglish
Title of host publicationECIS 2013 Proceedings
PublisherAssociation for Information Systems
Publication statusPublished - Jun 2013
Event21st European Conference on Information Systems, ECIS 2013 - Utrecht, Netherlands
Duration: 5 Jun 20138 Jun 2013

Conference

Conference21st European Conference on Information Systems, ECIS 2013
PlaceNetherlands
CityUtrecht
Period5/06/138/06/13

Research Keywords

  • China
  • Corporate IT Policy
  • Guanxi
  • Hotels
  • Knowledge Sharing
  • Socio Technical Theory

Publisher's Copyright Statement

  • COPYRIGHT TERMS OF DEPOSITED POSTPRINT FILE: © The Author(s).

Fingerprint

Dive into the research topics of 'Sharing Knowledge in Technology Deficient Environments: Individual Workarounds amid Corporate Restrictions'. Together they form a unique fingerprint.

Cite this