General Exam

At the University of Washington Information School, each PhD student must complete a General Exam (GE) after completing basic coursework. The GE is supposed to prove that a student has sufficient mastery of the existing knowledge in their chosen domain before moving on to propose their dissertation topic. Over about 10 weeks, the PhD student does the following:

  1. Submit a Statement of Interest and a Reading List regarding their topic.
  2. Allow time for their committee members to respond and formulate the questions for the exam.
  3. Spend two weeks writing answers to the exam.
  4. Allow time for the committee members to read the work.
  5. Hold an oral defense where the student responds to the committee’s questions about the work.

My statement and reading list are below. The reading list is the static version I submitted rather than the dynamic version I maintain here.

Statement of Interest

Software project failure continues to be a concern, and managing risk our best hope of project success. While information systems (IS) literature has examined the role of culture in projects, it often focuses on the management of multinational project work and how ethnic or national identities impact enterprise-level system development. Recently, information system researchers have begun to focus on how a user’s identities—their internalizations of cultural meaning—can affect adoption and use of technology, but identification with technology may also impact its development. This area of interest concerns the ways in which project worker identification with their products might affect behavior, using digital game development as a highly salient context. The following areas of interest inform this research:

  • Identity – Structural symbolic interactionist theories of identity, focusing on IT identity
  • Project Management – The execution of one-time endeavors within organizations, focusing on IT projects and the management of risk in those projects, and focusing further on feature creep as a specific risk.
  • Cultural Production – Organizational development of cultural texts, focusing on digital game production and gameworkers

IT, Culture, and the Cultural Industries

Some segments of the information technology (IT) industry also comprise a portion of the cultural industries [34], [40]. Organizations are categorized as part of the cultural industries “because they deal primarily with the industrial production and circulation of texts” [34, p. 6] and “are most directly involved in the production of social meaning” [34, p. 16] [emphasis in original]. Along with digital games, the list of cultural industries includes journalism, film, television, radio, and marketing. For all of these, the focus of production is less on utility than on conveying a message of social significance [34].

The IT segments of the cultural industries use the same basic IT methods, but produce cultural texts, including digital games [34]. Culture is societal meaning, “the signifying system through which… a social order is communicated, reproduced, experienced and explored” [90, p. 12-13]. Structural symbolic interactionist theories of identity concern “the nature of the individual and the relationship between individual and society” [13, p. 9], and tell us that an individual’s many identities are formed by the internalization of cultural meaning [13]. One’s identity as a parent, for example, is one’s internalization of everything one has found in society about what it means to be a parent. While one’s sense of self can shift over time, identity theories tell us that individuals tend to alter behaviors, create self-confirming environments, and selectively process information to verify or confirm their identities and maintain a sense of self [13], [76].

Most heavily analyzed in identity literature are role identities, which internalize society’s expectations when acting in a societal role [13] (e.g. “parent,” “employee,” or “spouse”). Group identities serve a similar function for members of groups [13], including religious, ethnic, and cultural groups. Person identities are those that attempt to distinguish one as a unique individual [13]. Researchers have also explored material identities, tied to possessions or places [20], [76], which are constructed, enacted, and verified just like role, group, and person identities.

Recently, IS researchers have begun to focus on how users’ identities can affect adoption and use of technology. IT identity has been defined as “the extent to which an individual views use of an IT as integral to his or her sense of self” [14, p. 932] and is rooted in structural symbolic interactionist theories of identity [14]. An IT identity is theorized in three dimensions: relatedness, emotional energy, and dependence. People having an IT identity will feel that they are connected to IT; experience sensations of “confidence, enthusiasm, and energy” [14, p. 945] when considering IT; and believe that they can rely upon IT to help them in their work and personal lives. Users exhibiting their IT identities will have comparatively higher levels of use, seek out ways to use the IT and explore additional affordances of the IT, and resist replacing it with new, different technology.

IT identity was originally conceived as a new form of material identity, encompassing technology at many levels [14]. As defined, IT identity applies to an “an IT,” but identities can be complex and overlapping. An IT identity may be with a class of devices, a device, an operating system, an application, or a function of an application. In the same way, game-related identities may exist at the level of a platform, a device, a game genre, a game franchise, a specific game, or a game mechanic.

Understanding IT identity is fundamental to understanding how individuals interact with technology on a day-to-day basis, but identification with technology may also impact its development. While IS literature has historically focused on enterprise software (e.g. B2B or internal development, installation, customization, and outsourcing), consumer IT is created to appeal to broader markets. The individuals creating consumer IT are often part of the target market and may identify with the technology on more than a professional level. In identifying with the underlying technology, worker behavior may be affected in significant ways that impact project processes, such as risk behaviors, and therefore impact outcomes.

In IS literature, much of the identity work might be characterized as focusing on the interactions of national cultures in multinational development efforts or the effects of organization culture on the development process [45]. The former constitutes a study of group identities (“I am a [nationality]”) while the latter concerns either group (“I am a [company] employee”) or role (“I am a [job role]”) identities. Little has been done concerning material identities in the workplace (e.g. [81]) and less on the impact of those on performance. Studying IT identity—conceptually defined as a material identity—by examining IT workers identification with their (material) project outcomes seems ideal.

Project and risk management have a rich history in IT. Considerable research has gone into identifying risk factors involved in software projects, often based on data provided by project staff and managers. Consistent among such research is the identification of risks involving project staff and technology choices. There is no single accepted list of software project risk factors, and multiple researchers have developed their own classification system for factors that have been identified [63], [80], [82].

It is possible that identification with a project’s intended final product affects many of the risk factors identified in risk management literature. Project workers, confronted with daily decisions regarding their projects, may self-verify by making choices that confirm the content of their IT identities. Risks associated with altering definition of the final product (“scope creep”, “feature creep”, and/or “gold plating”, depending on the author) seem highly likely to be affected, and tend to impact both schedule and budget as well, making them an ideal area of focus. For example, a worker who identifies with iPhones and who contributes to iPhone development may champion new, personally desirable features to better verify their identity with these devices. Equally, they may resist the addition of features that do not verify their identity. In either fashion, their self-verifying actions on the product team affect risks to the specification and affect the final product, for better or worse.

Digital Games as a Highly Salient Context

Since our identities are personal interpretation of social meaning, and game development is simultaneously the production of social meaning and the production of IT, game production seems an ideal domain in which to explore the effects of identity on the technical production process.

Academic and popular coverage of the game industry shows that the digital games industry tends to hire gamers as gameworkers in a fashion not as often repeated in other IT segments [28], [40]. By focusing on gameworkers, research on IT identity within projects can use their documented identification with project outcomes to more clearly see the effects in the data collected.

While self-confirmatory behaviors certainly occur in some fashion in all software developers, they are likely to be stronger when workers identify strongly with their projects, or have multiple identities driving behavior, as with gamers making games. The self-confirmatory behaviors they engage in affect their interactions with their co-workers and their performance of their work duties.

Understanding a technology worker’s IT identity may be fundamental to understanding workplace behavior. Just as IT identity research helps us understand how consumers behave in relation to technology they use, it may also help us understand how workers behave in relation to technology they create.


Reading List

  1. Adams, A., & Cox, A. L. (2008). Questionnaires, in-depth interviews and focus groups. In P. Cairns & A. L. Cox (Eds.), Research Methods for Human Computer Interaction (pp. 17–34). Cambridge, UK: Cambridge University Press.
  2. Andersson, Å. E. (2006). The economics of experiences, the arts and entertainment. Cheltenham, UK ; Northampton, MA: Edward Elgar.
  3. Baccarini, D., Salm, G., & Love, P. E. D. (2004). Management of risks in information technology projects. Industrial Management & Data Systems, 104(4), 286–295.
  4. Barki, H., Rivard, S., & Talbot, J. (1993). Toward an assessment of software development risk. Journal of Management Information Systems, 10(2), 203–225.
  5. Barki, H., Rivard, S., & Talbot, J. (2001). An Integrative Contingency Model of Software Project Risk Management. Journal of Management Information Systems, 17(4), 37–69.
  6. Barney G. Glaser. (2006). The discovery of grounded theory: strategies for qualitative research. New Brunswick, N.J.: Aldine Transaction a division of Transaction Publishers.
  7. Bechky, B. A. (2006). Gaffers, gofers, and grips: Role-based coordination in temporary organizations. Organization Science, 17(1), 3–21.
  8. Belk, R. W. (1988). Possessions and the Extended Self. Journal of Consumer Research, 15(2), 139–168.
  9. Bérubé, J., & Gauthier, J.-B. (2017). Compromise between creative activities and project management activities: a contingency factor. The Journal of Modern Project Management, 5(2).
  10. Boehm, B., & Turner, R. (2003). Using risk to balance agile and plan-driven methods. Computer, 36(6), 57–66.
  11. Boehm, B. W. (1991). Software risk management: principles and practices. IEEE Software, 8(1), 32–41.
  12. Brinkmann, S. (2014). Unstructured and Semi-Structured Interviewing. In The Oxford Handbook of Qualitative Research. Oxford Handbooks Online.
  13. Burke, P. J., & Stets, J. E. (2009). Identity Theory (1st ed.). Oxford; New York: Oxford University Press.
  14. Carter, M., & Grover, V. (2015). Me, My Self, and I(T):  Conceptualizating Information Technology Identity and its Implications. MIS Quarterly, 39(4), 931–957.
  15. Cecez-Kecmanovic, D., Kautz, K., & Abrahall, R. (2014). Reframing Success and Failure of Information Systems: A Performative Perspective. MIS Quarterly, 38(2), 561.
  16. Charette, R. N. (1996). Large-scale project management is risk management. Software, IEEE, 13(4), 110–117.
  17. Charette, Robert N. (1996). The mechanics of managing IT risk. Journal of Information Technology, 11(4), 373–378.
  18. Charmaz, K. (2006). Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. SAGE.
  19. Clancy, T. (1995). The Standish Group Report. Chaos Report.
  20. Clayton, S. D., & Opotow, S. (Eds.). (2003). Identity and the natural environment: the psychological significance of nature. Cambridge, Mass: MIT Press.
  21. Cooke-Davies, T. (2002). The “real” success factors on projects. International Journal of Project Management, 20(3), 185–190.
  22. Coyle, S., & Conboy, K. (2009). A case study of risk management in agile systems development. ECIS 2009 Proceedings.
  23. Cule, P. (2000). Strategies for Heading Off is Project Failure. Information Systems Management, 17(2), 65.
  24. David F Birks, Walter Fernandez, Natalia Levina, & Syed Nasirin. (2012). Grounded theory method in information systems research: its nature, diversity and opportunities. European Journal of Information Systems, 22(1), 1.
  25. Deuze, M., Martin, C. B., & Allen, C. (2007). The Professional Identity of Gameworkers. Convergence, 13(4), 335–353.
  26. Dillman, D. A., Smyth, J. D., & Christian, L. M. (2014). Internet, Phone, Mail, and Mixed-Mode Surveys: The Tailored Design Method. New York, UNITED STATES: John Wiley & Sons, Incorporated.
  27. Dittmar, H. (2008). Consumer Culture, Identity and Well-Being: The Search for the “Good Life” and the “Body Perfect.” New York, NY: Psychology Press.
  28. Dovey, J., & Kennedy, H. W. (2006). Game cultures: computer games as new media. Maidenhead, Berkshire, England; New York, NY: Open University Press.
  29. Elliott, B. (2007). Anything is possible: Managing feature creep in an innovation rich environment. In 2007 IEEE International Engineering Management Conference (pp. 304–307). Lost Pines, TX, USA: IEEE.
  30. Field, T. (1997). When bad things happen to good projects. CIO, 11(2), 54–62.
  31. Fields, T. (2010). Distributed Game Development: Harnessing Global Talent to Create Winning Games. Oxford: Focal Press.
  32. Floyd, C., Mehl, W.-M., Resin, F.-M., Schmidt, G., & Wolf, G. (1989). Out of Scandinavia: Alternative Approaches to Software Design and System Development. Human–Computer Interaction, 4(4), 253–350.
  33. Hesmondhalgh, D. (2006). Bourdieu, the media and cultural production. Media, Culture & Society, 28(2), 211–231.
  34. Hesmondhalgh, D. (2012). The Cultural Industries (Third Edition). London: SAGE Publishing.
  35. Hijazi, H., Khdour, T., & Alarabeyyat, A. (2012). A review of risk management in different software development methodologies. International Journal of Computer Applications, 45(7), 8–12.
  36. Jones, C. (1994). Assessment and control of software risks. Englewood Cliffs, NJ: Yourdon Press.
  37. Keil, M., Cule, P. E., Lyytinen, K., & Schmidt, R. C. (1998). A Framework for Identifying Software Project Risks. Communications of the ACM, 41(11), 76–83.
  38. Keil, M., Mann, J., & Rai, A. (2000). Why Software Projects Escalate:  An Empirical Analysis and Test of Four Theoretical Models. Computer Information Systems Faculty Publications.
  39. Keil, M., Tiwana, A., & Bush, A. (2002). Reconciling user and project manager perceptions of IT project risk: a Delphi study. Information Systems Journal, 12(2), 103–119.
  40. Kerr, A. (2006). The business and culture of digital games: gamework/gameplay. London; Thousand Oaks, Calif.: SAGE.
  41. Kerr, A. (2017). Global games: production, circulation and policy in the networked era. London; New York: Routledge/Taylor & Francis Group.
  42. Kilduff, M., Funk, J. L., & Mehra, A. (1997). Engineering Identity in a Japanese Factory. Organization Science, 8(6), 579–592.
  43. Kreiner, G. E., & Ashforth, B. E. (2004). Evidence toward an expanded model of organizational identification. Journal of Organizational Behavior, 25(1), 1–27.
  44. Lang, K., Shang, R., & Vragov, R. (2015). Consumer Co-creation of Digital Culture Products: Business Threat or New Opportunity? Journal of the Association for Information Systems, 16(9).
  45. Leidner, D. E., & Kayworth, T. (2006). Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict. MIS Quarterly, 30(2), 357–399.
  46. Lin, C.-P., & Bhattacherjee, A. (2010). Extending technology usage models to interactive hedonic technologies: a theoretical model and empirical test. Information Systems Journal, 20(2), 163–181.
  47. Miège, B. (1989). The capitalization of cultural production. New York, NY: International General.
  48. Moynihan, T. (1997). How experienced project managers assess risk. IEEE Software, 14(3), 35–41.
  49. Murdock, G. (2011). Political Economies as Moral Economies: Commodities, Gifts, and Public Goods. In J. Wasko, G. Murdock, & H. Sousa (Eds.), The Handbook of Political Economy of Communications (pp. 11–40). Wiley-Blackwell.
  50. Nandhakumar, J., Panourgias, N. S., & Scarbrough, H. (2013). From Knowing It to “Getting It”: Envisioning Practices in Computer Games Development. Information Systems Research, 24(4), 933–955.
  51. Neves, F. G., Borgman, H., & Heier, H. (2016). Success Lies in the Eye of the Beholder: The Mismatch Between Perceived and Real IT Project Management Performance. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 5878–5887).
  52. Nidumolu, S. (1995). The Effect of Coordination and Uncertainty on Software Project Performance: Residual Performance Risk as an Intervening Variable. Information Systems Research, 6(3), 191–219.
  53. Nowlis, S. M., & Simonson, I. (1996). The Effect of New Product Features on Brand Choice. Journal of Marketing Research, 33(1), 36–46.
  54. Paul, J. (2007). Tolerance of Escalating Commitment to Troubled Projects. AMCIS 2007 Proceedings.
  55. Rai, A., Maruping, L. M., & Venkatesh, V. (2009). Offshore Information Systems Project Success: The Role of Social Embeddedness and Cultural Characteristics. MIS Quarterly, 33(3), 617-A7.
  56. Reifer, D. (2002). Ten deadly risks in Internet and intranet software development. IEEE Software, 19(2), 12–14.
  57. Ropponen, J., & Lyytinen, K. (2000). Components of software development risk: how to address them? A project manager survey. IEEE Transactions on Software Engineering, 26(2), 98–112.
  58. Rossi, P. H., Wright, J. D., & Anderson, A. B. (2013). Handbook of Survey Research. Academic Press.
  59. Sadler, D. (1997). The Global Music Business as an Information Industry: Reinterpreting Economies of Culture. Environment and Planning A, 29(11), 1919–1936.
  60. Schäfer, M. T., & Schäfer, M. T. (2014). Bastard Culture!: How User Participation Transforms Cultural Production. Amsterdam, NETHERLANDS: Amsterdam University Press.
  61. Schiller, D. (1994). From Culture to Information and Back Again: Commoditization as a Route to Knowledge. Critical Studies in Mass Communication, 11(1), 93.
  62. Schmalz, M., Finn, A., & Taylor, H. (2014). Risk Management in Video Game Development Projects. In 2014 47th Hawaii International Conference on System Sciences (pp. 4325–4334).
  63. Schmidt, R., Lyytinen, K., Keil, M., & Cule, P. (2001). Identifying Software Project Risks: An International Delphi Study. Journal of Management Information Systems, 17(4), 5–36.
  64. Schreier, J. (2017). Blood, Sweat, and Pixels: The Triumphant, Turbulent Stories Behind How Video Games Are Made. HarperCollins.
  65. Schwartz, S. J., Luyckx, K., & Vignoles, V. L. (Eds.). (2011). Handbook of Identity Theory and Research. New York: Springer-Verlag.
  66. Scott, J. E., & Vessey, I. (2002). Managing Risks in Enterprise Systems Implementations. ACM, 45(4), 74–81.
  67. Shmueli, O., Pliskin, N., & Fink, L. (2013). The Planning Fallacy as an Explanation for Over-Requirement in Software Development. International Research Workshop on IT Project Management 2013.
  68. Shmueli, O., Pliskin, N., & Fink, L. (2014). Behavioural Effects in Software Development: An Experimental Investigation. ECIS 2014 Proceedings.
  69. Shmueli, O., Pliskin, N., & Fink, L. (2015). Explaining over-requirement in software development projects: An experimental investigation of behavioral effects. International Journal of Project Management, 33(2), 380–394.
  70. Shmueli, O., Pliskin, N., & Fink, L. (n.d.). The Dark Side of Emotional Involvement in Software Development: A Behavioral Economics Perspective. Asia Pacific Journal of Information Systems, 26(2), 322–337.
  71. Shmueli, O., & Ronen, B. (2017). Excessive software development: Practices and penalties. International Journal of Project Management, 35(1), 13–27.
  72. Storey, J. (2015). Cultural Theory and Popular Culture: An Introduction. London, UNITED KINGDOM: Routledge.
  73. Sumner, M. (2000). Risk factors in enterprise-wide/ERP projects. Journal of Information Technology, 15(4), 317–327.
  74. Sutton-Smith, B. (2001). The ambiguity of play (2. printing, 1. Harvard Univ. Press paperback ed). Cambridge, Mass.: Harvard Univ. Press.
  75. Swann, W. B. (2011). Self-verification theory. In Handbook of theories of social psychology (Vol. 2, pp. 23–42).
  76. Swann, W. B., & Buhrmester, M. D. (2012). Self-verification: The search for coherence. In M. R. Leary & J. P. Tangney (Eds.), Handbook of Self and Identity (Second Edition). New York; London: Guilford Press.
  77. Taylor, H. (2004). Risk factors in vendor-driven IT projects. AMCIS 2004 Proceedings, 108.
  78. Taylor, H. (2005). Congruence between risk management theory and practice in Hong Kong vendor-driven IT projects. International Journal of Project Management, 23(6), 437–444.
  79. Taylor, H. (2006). Risk management and problem resolution strategies for IT projects: prescription and practice. Project Management Quarterly, 37(5), 49.
  80. Taylor, H. A. (2004). Risk management and tacit knowledge in IT projects: making the implicit explicit (phd). Queensland University of Technology.
  81. Tian, K., & Belk, R. W. (2005). Extended Self and Possessions in the Workplace. Journal of Consumer Research, 32(2), 297–310.
  82. Wallace, L., & Keil, M. (2004). Software Project Risks and Their Effect on Outcomes. Communications of the ACM, 47(4), 68–73.
  83. Wallace, L., Keil, M., & Rai, A. (2004a). How Software Project Risk Affects Project Performance: An Investigation of the Dimensions of Risk and an Exploratory Model*. Decision Sciences, 35(2), 289–321.
  84. Wallace, L., Keil, M., & Rai, A. (2004b). Understanding software project risk: a cluster analysis. Information & Management, 42(1), 115–125.
  85. Warkentin, M., Bekkering, E., Johnston, A., & Moore, R. (2007). Risk Perspectives in Systems Development. AMCIS 2007 Proceedings.
  86. Wasko, J., Murdock, G., & Sousa, H. (2011). Introduction: The Political Economy of Communications: Core Concerns and Issues. In J. Wasko, G. Murdock, & H. Sousa (Eds.), The Handbook of Political Economy of Communications (pp. 1–10). Wiley-Blackwell.
  87. Whitley, E. A., Gal, U., & Kjaergaard, A. (2014). Who do you think you are? A review of the complex interplay between information systems, identification and identity. European Journal of Information Systems, 23(1), 17–35.
  88. Whitson, J. R. (2017). Voodoo software and boundary objects in game development: How developers collaborate and conflict with game engines and art tools. New Media & Society, 1461444817715020.
  89. Williams, D., & Williams, D. (2009). Exploring Software project characteristics on Scope Creep. SAIS 2009 Proceedings.
  90. Williams, R. (1981). Culture. London: Fontana.
  91. Williams, R. (1998). The Analysis of Culture. In Cultural Theory and Popular Culture: A Reader (2nd ed, pp. 48–56). Athens, GA: University of Georgia Press.
  92. Yin, R. K. (2009). Case Study Research: Design and Methods (Fourth Edition). Los Angeles, CA: SAGE.