skip to main content
article
Free access

Environmental and institutional models of system development: a national criminal history system

Published: 01 July 1985 Publication History

Abstract

This article tests two competing theories of system development referred to here as environmental and institutional models. These models form the basis for most explanations of why systems are developed and utilized. We will examine both models in detail and apply them to a single set of data concerned with the emerging national computerized criminal history system (CCH). A hybrid model, which combines elements of environmental and institutional approaches, is also developed and tested. A substantive result of this new model will alter our understanding of why a national CCH system is being developed. At the theoretical level, we conclude that a hybrid model is more powerful than either an environmental or an institutional model taken separately and that future research must take this into account.

References

[1]
Aiken, M., and Hage. J. Organizational interdependence and intraorganizational structure. Am. Social. Rev. (Dec. 1966).
[2]
Allison, G. Essence of Decision. Little, Brown, Boston, Mass., 1971.
[3]
American Federation of Information Processing Societies (AFIPS). A National Survey of the Public's Attitude Towards Computers. AFIPS, Montvale, N.J. 1972.
[4]
Anderson, R.E. Sociological analyses of public attitudes toward computers and information files. In Proceedings of the Joint Computer Conference (Spring 1972), pp. 649-657.
[5]
Argyris, C. Management information systems: The challenge to rationality and emotionality. Manage. Sci. 17, (1971).
[6]
Bell, D. The Coming of Post-industrial Society. Basic Books, New York, 1973.
[7]
Bjorn-Anderson, N. and Eason. K. Myths and realities of information systems contributing to organizational rationality. In Proceedings of fhe Second Conference on Computers and Human Choice, A. Mowshowitz, Ed., North Holland, Amsterdam, 1981.
[8]
Blalock. H.M. Social Sfafisfics. McGraw-Hill, New York, 1972.
[9]
Blauner, R. Alienation and Freedom. Univ. Chicago Press, Chicago, 1964.
[10]
Brewer, G.D. Politicians, Bureaucrats and Consulfonts. Basic Books, New York, 1974.
[11]
Burns. T. and Stalker, CM. The Management of Innovafion. Tavistock, London, 1961.
[12]
Citizens Conference on State Government. The Sometime Governments. Bantam, New York, 1972.
[13]
Cohen, M.D., March, J.G., and Olsen, M.D. A garbage can model of organizational choice. Adm. Sci. Q. 17. (1972).
[14]
Colton. K. (Ed.) Police Compufer Technology. Lexington Books, Lexing ton, Mass., 1978.
[15]
Council on State Governments. The Book of the States. Council on State Governments, Lexington, Ky. 1980.
[16]
Crazier, M. The Bureaucratic Phenomenon. Univ. Chicago Press, Chicago, 1964.
[17]
Danziger. J.N. and Dutton, W.H. "Computers as an innovation in American local governments." Commun. ACM 20,12 (Dec. 1977).
[18]
Danziger. J.N., Dutton. W.H., Kling, R., and Kraemer, K. Computers and Polifics. Columbia Univ. Press, New York, 1982.
[19]
Danziger, J.N., and Kling, R. The computing milieu. In Danziger, et al. Compufer and Polifics. Columbia University Press, New York, 1982.
[20]
Doernberg, D.L. and Zeigler, D.H. Due process versus data processings: An analyses of computerized criminal history information systems. New York Univ. Law Rev. 55, 6 (Dec. 1960), 1110-1230.
[21]
Downs, A. Inside Bureaucracy. Little, Brown, Boston, Mass., 1967.
[22]
Dye, T.R. Politics in States and Communifies. Prentice-Hall, EngIewood Cliffs, N.J. 1981.
[23]
Federal Bureau of Investigation. National Crime Information Center--Proposed Limited Message Switching Implementation Plan. FBI, Washington, D.C. Apr. 14, 1975.
[24]
Gibson, CF., and Nolan, R.L. Managing the four stages of EDP growth. Harvard Bus. Rev. (Jan.-Feb. 1974). 76-88.
[25]
Gould, I. and Kolb, W.L. (Eds.) Dicfionory of the Social Sciences. Free 25. Press, New York, 1969.
[26]
Hawley, A.H. Human Ecology. Ronald Press, New York, 1950.
[27]
Hoes. I.R. Systems Analyses in Public Policy. Univ. California Press, Berkeley, 1972.
[28]
Kanter. R.M. Men and Women of the Corporafion. Basic Books, New York. 1977.
[29]
Kling, R. Automated welfare client tracking service integration: The political economy of computing. Commun. ACM 21, (1978),484-492.
[30]
Kling. R., and Scacchi, W. Social analyses of computing: Theoretical perspectives in recent empirical research. Compuf. Sure. 12, 1 (Mar. 1980), m-110.
[31]
Kraemer. K.L., Dutton, W.H., and Northrop, A. The Management of Informalion Sysfems. Columbia Univ. Press, New York, 1981.
[32]
Kraemer, K.L., and Perry, J.L. The federal push to bring computer applications to local governments. Public Adm. Rev. (May/June 1979).
[33]
Laudon. K. Compufers and Bureaucratic Reform. Wiley, New York, 1974.
[34]
Laudon. K. Computers and cultural imperatives. Science, (Sept. 17. 1976). llll-'1112.
[35]
Laudon. K. Communications Technology and Democratic Participation. Praeger, New York, 1977.
[36]
Laudon, K. Manngemenf of Criminal History tnformafion Sysfems in The United Sfafes. Office of Technology Assessment, United States Congress, 1980.
[37]
Law Enforcement Assistance Administration. LEAA Eleventh Annual Report, Fiscal Year 1979. U.S. Department of Justice. Washington, DC., 1980.
[38]
Licklider. J.C.B., and Vezza A. Applications of Information Networks. In Proceedings offhe IEEE 66, 11 {Nov. 1978).
[39]
Lucas, H. Why Information Systems Fait. Columbia Univ. Press, New York, 1975.
[40]
Lucas, H. and Turner. J. A corporate strategy for the control of information processing. Sloan Manage. Rev. (Spring 1982).
[41]
Markus. M.L. Understanding information systems use in organizations: A theoretical explanation. Ph.D. dissertation, Case Western Reserve Univ. Cleveland, Ohio, 1979.
[42]
Meyer, J.W., <and Rowan, B. Institutionalized organizations: Formal structure as myth and ceremony. Am. J. So&t. 83, 2 (1982).
[43]
MITRE Corporation. tntptemenfing the Federal Privacy and Securify Regutafiom. Volume 1: Findings and Recommendations of an 18- State Assessment. METREK Division, McLean, Virginia, Dec. 1977.
[44]
MITRE Corporation. Implementing the Federal Privacy and Security Regulations. Volume 2: Problem Analyses and Practical Responses. McLean, Va., Dec. 1977.
[45]
Mowshowitz, A. Conquest of Will. Addison-Wesley, Reading, Mass., 1976.
[46]
National Association of State Information Systems. Annual Report 1980. Nasis. Lexington, Ky., 1980.
[47]
Office of Technology Assessment, United States Congress. Attemafives for A National Compuferized Criminal History System. U.S. Government Printing Office, Washington, D.C. 1982.
[48]
Olson, M. User involvement and decentralization of the development function: A comparison of two case studies. Sysf. Objectives, Solutions I, 2 (Apr. 1981). 59-69.
[49]
Omnibus Crime Control and Safe Streets Act of 1968. U.S. Congress, 1968.
[50]
Parker, R.N., and Smith, M.D. Deterrence, poverty, and type of bomicide. Am. J. Social. 85, 3 (1979). 614-624.
[51]
Perrow, C. Ccmplex Orgar~izafions. Scott Foresman. Glen View, 111. 19i9.
[52]
Pettigrew. A. The Polifics of Orgmizafional Decisionmaking. Tavistock, London, 1973.
[53]
Privacy Protection Study Commission. Personal Privacy in an tnformafion Society. U.S. Government Printing Office, Washington, DC., July 1977.
[54]
Project SEARCH. In Proceedings of the National Symposium on Criminal \ustice tnfimmfion and Sfafisfics Systems. Sacramento: SEARCH GKIU~, In~.,i970,i9n,i974, 1979.
[55]
President's Commission on Law Enforcement and Administration of Justice. The Challenge of Crime in a Free Society. U.S. Government Printing Office. Washington, D.C., 1967. Task Force Report: Science and Technology.
[56]
Rogers, E.M. (with Floyd, F.). Diffusion of Innovations. Free Press, New York, 1971.
[57]
Rule. J. McAdam, D., Stearns, L., and Uglow, D. The Politics of Privacy. Elsevier, New York, 1980.
[58]
Schrag. P. Village School Downtown. Beacon Press, Boston. Mass., 1967.
[59]
Stinchcombe, A.L. Constructing Social Theories. Harcourt Brace, New York, 1968.
[60]
Thompson, J.D. Organizations in Action. McGraw-Hill, New York, 1967.
[61]
United States Bureau of the Census. Statistical Abstract of the United States. 1980. United States Department of Commerce. Washington, DC. 1980.
[62]
United States Department of Education. Digest of Educational Sfafisfirs 1981. Washington, DC., 1982.
[63]
United States Department of Labor. A Study of the Number of Persons with Records @Arrest or Convicfion in the Labor Force. Washington, D.C.; U.S. Department of Labor, Technical Analysis Paper 63, Jan. 1979.
[64]
Westin. A., and Baker, M. Dafa Banks in a Free Society: Computers, Recordkeeping, and Privacy. Quadrangle Books, New York, 1972.
[65]
Wildavsky. A., with Pressman, J. In~plemenfafion. zd ed., Univ. of California Press, Berkeley, 1979.
[66]
Woodward, J. Jndusfriat Organization: Theory and Practice. Oxford Univ. Press, Oxford, England, 1965.
[67]
Yin, R.K. Heald. K. and Vogel, M. Tinkering urith the System: Technological Innovations in Stare and Local Services. Lexington Books, Lexington, Mass., 1977.
[68]
Zaltman, G. et al. tnnovafions and Organizations. Wiley, New York, 1973.

Cited By

View all

Recommendations

Reviews

Stephen R. Ruth

This paper offers detailed empirical evidence on testing two competing theories of system development. The environmental model includes external uncertainties and opportunities not directly controlled by the organization: hardware costs, market growth, external funding, or simply “complexity.” Institutional models focus on endogenous factors which the organization can control, such as norms, social structure, and values. The author examines one of the largest system design efforts ever undertaken, the Computerized Criminal History (CCH) system, to test the relevance of the two models—environmental and institutional—in the devleopment process. The CCH, which consists of 195,000 criminal history records in the United States on over 36 million individuals active in the labor force, is easily one of the largest public sector databases. The author considers CCH from three perspectives: adoption, utilization, and management of the systems. Extensive data are available as each state in the US adopts the CCH, and skillfully groups relatively prosaic numbers into these three perspectives. For example, Laudon uses crime rates per 100,000 citizens and prisoners per 100,000 citizens as proxy variables for environmental factors. Similarly, megabytes per capita is used as an institutional factor. The results are quite interesting because there is clear evidence that neither model is clearly predictive. The environmental model is not supported since “the actual use of these systems (CCH) is not related to crime rates at all” (p. 739). A blend of the theories is called for. As the author concludes: Management scientists and students of MIS who see systems primarily as responses to environmental “needs” of an organization and social scientists who see systems primarily resulting from the working-out of organizational forces may both be over-simplifying.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 28, Issue 7
July 1985
85 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3894
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1985
Published in CACM Volume 28, Issue 7

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)518
  • Downloads (Last 6 weeks)32
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media