When network governance is needed to control IT-applications used in coordination and innovation

Frank Jan de Graaf, Hugo Velthuijsen

Research output: Working paperProfessional

262 Downloads (Pure)


IT-based networking trends such as the rise of social media, crowd sourcing, open innovation, and cloud computing enable a profoundly different way of working and collaborating that challenges significantly traditional approaches of companies towards governance, i.e. the mechanisms a company employs to achieving business results and safeguarding information. Standard practices developed with a hierarchical model of the company in mind, are inadequate for providing sufficient correlation between governance mechanisms deployed and results achieved. Popular literature on the subject states that dealing effectively with such new technologies in a business environment requires relinquishing control and subverting to trust. This paper makes the case that deploying successfully new IT-based networking tools rather involves shifting one’s trust from a well-established and well-known governance system based on hierarchy and control towards another governance system, termed in the literature as network governance. This paper assesses when network governance is the better suited governance system. The presented theoretical model helps to understand how companies should use arising new technologies and which tasks are suited for network-driven IT-applications. Furthermore, the model enables to understand how network governance works to achieve business results and to safeguard information exchanges.
Original languageEnglish
Number of pages12
Publication statusPublished - 9 Sept 2010


  • information technology
  • organisational development
  • networks
  • management
  • entrepreneurship
  • innovation
  • network-IT
  • IT-governance
  • network governance theory


Dive into the research topics of 'When network governance is needed to control IT-applications used in coordination and innovation'. Together they form a unique fingerprint.

Cite this