TY - JOUR
T1 - Did you get my Email?!—Leveraging boundary work tactics to safeguard connectivity boundaries
AU - Waizenegger, Lena
AU - Remus, Ulrich
AU - Maier, Ronald
AU - Kolb, Darl
N1 - Publisher Copyright:
© Association for Information Technology Trust 2023.
PY - 2024/3
Y1 - 2024/3
N2 - Being connected to the Internet through various mobile devices is pervasive in our daily professional and private lives. Yet, the way people connect, including when, with whom and through which communication channels differs, manifesting individuals’ idiosyncratic connectivity patterns. In team collaboration, where individuals are dependent on each other’s availability and responsiveness, differences in team members’ connectivity patterns can lead to clashing expectations concerning connectivity. This, in turn, can compromise individuals’ well-being and productivity and threaten team collaboration outcomes. In this paper, we address the question of how to manage connectivity in interdependent teams and align connectivity patterns to facilitate successful collaboration while at the same time safeguarding individuals’ connectivity boundaries. To address this question, we conducted a qualitative case study that involved 39 semi-structured interviews with employees and members of the management board of an international consultancy headquartered in Germany. Building on concepts established in boundary theory, we coined the term “connectivity boundaries” and identified the six boundary work tactics, externalizing, accommodating, adapting, pushing, sacrificing, and enforcing that allow team members to create, maintain, temporarily change, and reclaim their connectivity boundaries and achieve team collaboration success. We developed propositions that highlight which contextual factors and goals are associated with which boundary work tactic.
AB - Being connected to the Internet through various mobile devices is pervasive in our daily professional and private lives. Yet, the way people connect, including when, with whom and through which communication channels differs, manifesting individuals’ idiosyncratic connectivity patterns. In team collaboration, where individuals are dependent on each other’s availability and responsiveness, differences in team members’ connectivity patterns can lead to clashing expectations concerning connectivity. This, in turn, can compromise individuals’ well-being and productivity and threaten team collaboration outcomes. In this paper, we address the question of how to manage connectivity in interdependent teams and align connectivity patterns to facilitate successful collaboration while at the same time safeguarding individuals’ connectivity boundaries. To address this question, we conducted a qualitative case study that involved 39 semi-structured interviews with employees and members of the management board of an international consultancy headquartered in Germany. Building on concepts established in boundary theory, we coined the term “connectivity boundaries” and identified the six boundary work tactics, externalizing, accommodating, adapting, pushing, sacrificing, and enforcing that allow team members to create, maintain, temporarily change, and reclaim their connectivity boundaries and achieve team collaboration success. We developed propositions that highlight which contextual factors and goals are associated with which boundary work tactic.
KW - Boundary theory
KW - boundary work tactics
KW - case study research
KW - connectivity boundaries
KW - connectivity patterns
KW - team collaboration
UR - http://www.scopus.com/inward/record.url?scp=85163048335&partnerID=8YFLogxK
U2 - 10.1177/02683962231175924
DO - 10.1177/02683962231175924
M3 - Article
VL - 39
SP - 123
EP - 148
JO - Journal of Information Technology
JF - Journal of Information Technology
IS - 1
ER -