Knowledge

Information infrastructure

Source 📝

96: 489: 464: 33: 585:"Information infrastructures can, as formative contexts, shape not only the work routines, but also the ways people look at practices, consider them 'natural' and give them their overarching character of necessity. Infrastructure becomes an essential factor shaping the taken-for-grantedness of organizational practices" (Ciborra and Hanseth 1998). 550:
systems, analyzed as socio-technical power structures (Bygstad, 2008). Information infrastructure are typically different from the previous generations of "large technological system" because these digital sociotechnical systems are considered generative, meaning they allow new users to connect with or even appropriate the system.
554:
solutions supporting local practices which subsequently are linked together rather than by defining universal standards and subsequently implementing them" (Ciborra and Hanseth 1998). It has later been developed into a full design theory, focusing on the growth of an installed base (Hanseth and Lyytinen 2008).
553:
Information infrastructure, as a theory, has been used to frame a number of extensive case studies (Star and Ruhleder 1996; Ciborra 2000; Hanseth and Ciborra 2007), and in particular to develop an alternative approach to IS design: "Infrastructures should rather be built by establishing working local
549:
The concept of information infrastructure (II) was introduced in the early 1990s, first as a political initiative (Gore, 1993 & Bangemann, 1994), later as a more specific concept in IS research. For the IS research community, an important inspiration was Hughes' (1983) accounts of large technical
569:
as excellent examples (Bygstad, 2008). Bowker has described several key terms and concepts that are enormously helpful for analyzing information infrastructure: imbrication, bootstrapping, figure/ground, and a short discussion of infrastructural inversion. "Imbrication" is an analytic concept that
534:
is defined by Ole Hanseth (2002) as "a shared, evolving, open, standardized, and heterogeneous installed base" and by Pironti (2006) as all of the people, processes, procedures, tools, facilities, and technology which support the creation, use, transport, storage, and destruction of information.
658:
Borgman says governments, businesses, communities, and individuals can work together to create a global information infrastructure which links "the world's telecommunication and computer networks together" and would enable the transmission of "every conceivable information and communication
649:
argues information infrastructures, like all infrastructures, are "subject to public policy". In the United States, public policy defines information infrastructures as the "physical and cyber-based systems essential to the minimum operations of the economy and government" and connected by
542:(IS) field. It changed the perspective from organizations to networks and from systems to infrastructure, allowing for a global and emergent perspective on information systems. Information infrastructure is a technical structure of an organizational form, an analytical perspective or a 766:
was designed from June to September 1995, and implemented in on 29 September 1995. The Initiative was "a five-year $ 15 million US Government effort to support sustainable development" by bringing "full Internet connectivity" to approximately 20 African nations.
946:
Johnson, Nathan R. (2012). "Information Infrastructure as Rhetoric:Tools for Analysis". Poroi: An Interdisciplinary Journal of Rhetorical Analysis and Invention. 8 (1). doi:10.13008/2151-2957.1113.
591:"The set of organizational practices, technical infrastructure and social norms that collectively provide for the smooth operation of scientific work at a distance (Edwards et al. 2007). 1244:"Enhancing the Epistemological Project in the Rhetoric of Science: Information Infrastructure as Tool for Identifying Epistemological Commitments in Scientific and Technical Communities" 1114:
JUHÁSZ, Lilla. The information strategy of the European Union. In: PINTÉR, Róbert (Eds.). Information Society: From Theory to Political Practice. Budapest: Gondolat Kiadó, 2008, s. 132.
1085:
Johnston, Donald B. Robert Fabian Keith L. Geurts Donald S. Hicks Andrew Huzar Norman D. Inkster Alan Jaffee Paul McLennan Douglas J. Nash E. Michael Power Mark Stirling (2004).
433: 841: 588:"The technological and human components, networks, systems, and processes that contribute to the functioning of the health information system" (Braa et al. 2007). 821:"From systems and tools to networks and infrastructures – From design to cultivation. Towards a theory of ICT solutions and its design methodology implications 743:
In 1994, the European Union proposed the European Information Infrastructure.: European Information Infrastructure has evolved furthermore thanks to
884: 735:
in 1995. By 2000, "the commercial basis for Canada's information infrastructure" was established, and the government ended its role in the project.
51: 594:"A shared, evolving, heterogeneous installed base of IT capabilities developed on open and standardized interfaces" (Hanseth and Lyytinen 2008). 823: 956:
Star, Susan Leigh; Karen Ruhleder (March 1996). "Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces".
557:
Information infrastructures include the Internet, health systems and corporate systems. It is also consistent to include innovations such as
538:
The notion of information infrastructures, introduced in the 1990s and refined during the following decade, has proven quite fruitful to the
95: 1300: 17: 236: 1194:
Bowker, Geoffrey C (1996). "The history of information infrastructures: The case of the international classification of diseases".
687: 777:
Creating Sustainable Supply of Internet Services – help build the hardware and industry need for "full Internet connectivity".
1099: 856: 642: 679:
Telecommunications and Information Working Group (TEL) Program of Asian for Information and Communications Infrastructure.
780:
Enhancing Internet Use for Sustainable Development – improve the ability of African nations to use these infrastructures.
704: 241: 716: 517: 467: 1160: 676: 69: 1127: 318: 880:
Bygstad, Bendik (2008). "Information infrastructure as an organization: a critical realist view." Retrieved from
251: 1031: 323: 301: 1275: 763: 881: 281: 1305: 166: 820: 438: 308: 231: 191: 1086: 47: 181: 1165:
Leland Initiative: Africa GII Gateway Project Project Description & Frequently Asked Questions
1061: 474: 428: 291: 286: 510: 161: 196: 582:"Technological and non-technological elements that are linked" (Hanseth and Monteiro 1996). 646: 393: 211: 201: 8: 795: 790: 539: 224: 131: 723:
in 1989 and the network connecting "all provincial nodes" was operational in 1990. The
973: 929: 607:
According to Star and Ruhleder, there are 8 dimensions of information infrastructures.
276: 1207: 1095: 921: 800: 774:
Creating and Enabling Policy Environment – to "reduce barriers to open connectivity".
503: 408: 378: 296: 206: 126: 977: 933: 488: 1255: 1228: 1203: 1011: 965: 917: 913: 744: 732: 728: 543: 256: 176: 156: 888: 827: 725:
Canadian Network for the Advancement of Research, Industry and Education(CANARIE)
493: 388: 121: 901: 574:" is the idea that infrastructure must already exist in order to exist (2011). 403: 171: 151: 146: 759:
to help improve Africa's connection to the global information infrastructure.
1294: 925: 571: 443: 398: 368: 346: 136: 1260: 1243: 1233: 1216: 363: 358: 101: 1168: 662:
Currently, the Internet is the default global information infrastructure.
1135: 969: 373: 186: 141: 1016: 999: 313: 1094:. Ottawa: Public Safety and Emergency Preparedness Canada. p. 7. 882:
http://heim.ifi.uio.no/~phddays/15thPhDDays/Documents/Paper_Bendik.pdf
747:
report and projects eEurope 2003+, eEurope 2005 and iIniciaive 2010.
562: 558: 87: 724: 720: 566: 383: 105: 1000:"The premise and promise of a Global Information Infrastructure" 949: 902:"The Generative Mechanisms of Digital Infrastructure Evolution" 842:"Key Elements of a Threat and Vulnerability Management Program" 641:
Presidential Chair and Professor of Information Studies at the
756: 353: 246: 1088:
Critical Information Infrastructure Accountability in Canada
1280: 1217:"Information Infrastructure as Rhetoric:Tools for Analysis" 341: 653: 1285: 849:
INFORMATION SYSTEMS AUDIT AND CONTROL Shyam ASSOCIATION
665: 727:
was established in 1992 and CA*net was upgraded to a
1069:. e-ASEAN Task Force and UNDP-APDIP. pp. 35–36. 42:
may be too technical for most readers to understand
955: 900:Henfridsson, Ola; Bygstad, Bendik (3 March 2013). 899: 1292: 703:National Information Infrastructure Act of 1993 570:helps to ask questions about historical data. " 1132:USAID Leland Initiative: Leland Activity Update 770:The initiative had three strategic objectives: 755:In 1995, American Vice President Al Gore asked 1063:Nets, Webs and the Information Infrastructure 511: 1155: 1153: 518: 504: 463: 1259: 1232: 1015: 70:Learn how and when to remove this message 54:, without removing the technical details. 1150: 1122: 1120: 1084: 1055: 1053: 993: 991: 989: 987: 1241: 1214: 1196:Information Processing & Management 1059: 997: 839: 690:, e-ASEAN Framework Agreement of 2000. 688:Association of South East Asian Nations 654:Global Information Infrastructure (GII) 14: 1293: 1193: 1080: 1078: 1076: 998:Borgman, Christine L (7 August 2000). 1117: 1050: 984: 643:University of California, Los Angeles 636: 52:make it understandable to non-experts 26: 1073: 705:National Information Infrastructure 666:Regional information infrastructure 24: 623:Links with conventions of practice 25: 1317: 1301:Telecommunications infrastructure 1269: 1036:Global Information Infrastructure 682: 677:Asia-Pacific Economic Cooperation 108:through a portion of the Internet 698: 693: 487: 462: 319:Internet Message Access Protocol 94: 31: 1108: 1024: 940: 893: 874: 833: 813: 632:Becomes visible upon breakdown 577: 13: 1: 1187: 620:Learned as part of membership 602: 324:Simple Mail Transfer Protocol 302:Transmission Control Protocol 1208:10.1016/0306-4573(95)00049-M 958:Information Systems Research 830:, accessed 21 September 2004 764:USAID Leland Initiative (LI) 7: 1242:Johnson, Nathan R. (2014). 1215:Johnson, Nathan R. (2012). 784: 597: 282:Hypertext Transfer Protocol 10: 1322: 1060:Soriano, Edwin S. (2003). 918:10.25300/misq/2013/37.3.11 650:information technologies. 629:Built on an installed base 532:information infrastructure 270:Information infrastructure 18:Information Infrastructure 1161:"USAID Leland Initiative" 750: 738: 717:National Research Council 710: 309:Internet service provider 819:Hanseth, Ole (2002). KD 806: 182:Right to Internet access 1276:USAID Leland Initiative 1261:10.13008/2151-2957.1202 1234:10.13008/2151-2957.1113 1167:. USAID. Archived from 1134:. USAID. Archived from 855:: 52–56. Archived from 840:Pironti, J. P. (2006). 731:connection in 1993 and 670: 626:Embodiment of standards 429:History of the Internet 292:Internet protocol suite 287:Internet exchange point 826:14 August 2018 at the 162:Freedom of information 970:10.1287/isre.7.1.111 647:Christine L. Borgman 212:Virtual volunteering 1017:10.5210/fm.v5i8.784 887:25 May 2013 at the 796:Information science 791:Data infrastructure 540:information systems 494:Internet portal 434:Oldest domain names 1171:on 29 October 2011 1138:on 29 October 2011 637:As a public policy 277:Domain Name System 167:Internet phenomena 1306:IT infrastructure 1101:978-0-662-38155-6 801:IT infrastructure 528: 527: 379:Instant messaging 297:Internet Protocol 207:Virtual community 104:visualization of 80: 79: 72: 16:(Redirected from 1313: 1265: 1263: 1238: 1236: 1211: 1181: 1180: 1178: 1176: 1157: 1148: 1147: 1145: 1143: 1124: 1115: 1112: 1106: 1105: 1093: 1082: 1071: 1070: 1068: 1057: 1048: 1047: 1045: 1043: 1028: 1022: 1021: 1019: 995: 982: 981: 953: 947: 944: 938: 937: 897: 891: 878: 872: 871: 869: 867: 861: 846: 837: 831: 817: 745:Martin Bangemann 544:semantic network 520: 513: 506: 492: 491: 466: 465: 98: 84: 83: 75: 68: 64: 61: 55: 35: 34: 27: 21: 1321: 1320: 1316: 1315: 1314: 1312: 1311: 1310: 1291: 1290: 1272: 1190: 1185: 1184: 1174: 1172: 1159: 1158: 1151: 1141: 1139: 1126: 1125: 1118: 1113: 1109: 1102: 1091: 1083: 1074: 1066: 1058: 1051: 1041: 1039: 1038:. SearchCIO.com 1032:"SearchCIO.com" 1030: 1029: 1025: 996: 985: 954: 950: 945: 941: 898: 894: 889:Wayback Machine 879: 875: 865: 863: 862:on 11 June 2014 859: 844: 838: 834: 828:Wayback Machine 818: 814: 809: 787: 753: 741: 713: 701: 696: 685: 673: 668: 656: 639: 605: 600: 580: 524: 486: 481: 480: 457: 449: 448: 424: 416: 415: 337: 329: 328: 272: 262: 261: 227: 217: 216: 117: 109: 76: 65: 59: 56: 48:help improve it 45: 36: 32: 23: 22: 15: 12: 11: 5: 1319: 1309: 1308: 1303: 1289: 1288: 1283: 1278: 1271: 1270:External links 1268: 1267: 1266: 1239: 1212: 1189: 1186: 1183: 1182: 1149: 1116: 1107: 1100: 1072: 1049: 1023: 983: 964:(1): 111–134. 948: 939: 912:(3): 907–931. 892: 873: 832: 811: 810: 808: 805: 804: 803: 798: 793: 786: 783: 782: 781: 778: 775: 752: 749: 740: 737: 712: 709: 700: 697: 695: 692: 684: 683:Southeast Asia 681: 672: 669: 667: 664: 659:application." 655: 652: 638: 635: 634: 633: 630: 627: 624: 621: 618: 617:Reach or scope 615: 612: 604: 601: 599: 596: 579: 576: 526: 525: 523: 522: 515: 508: 500: 497: 496: 483: 482: 479: 478: 471: 458: 455: 454: 451: 450: 447: 446: 441: 436: 431: 425: 422: 421: 418: 417: 414: 413: 412: 411: 404:World Wide Web 401: 396: 391: 386: 381: 376: 371: 366: 361: 356: 351: 350: 349: 338: 335: 334: 331: 330: 327: 326: 321: 316: 311: 306: 305: 304: 299: 289: 284: 279: 273: 268: 267: 264: 263: 260: 259: 254: 249: 244: 239: 234: 228: 223: 222: 219: 218: 215: 214: 209: 204: 199: 194: 189: 184: 179: 174: 172:Net neutrality 169: 164: 159: 154: 152:Digital rights 149: 147:Digital divide 144: 139: 134: 129: 124: 118: 115: 114: 111: 110: 99: 91: 90: 78: 77: 39: 37: 30: 9: 6: 4: 3: 2: 1318: 1307: 1304: 1302: 1299: 1298: 1296: 1287: 1284: 1282: 1279: 1277: 1274: 1273: 1262: 1257: 1253: 1249: 1245: 1240: 1235: 1230: 1226: 1222: 1218: 1213: 1209: 1205: 1201: 1197: 1192: 1191: 1170: 1166: 1162: 1156: 1154: 1137: 1133: 1129: 1123: 1121: 1111: 1103: 1097: 1090: 1089: 1081: 1079: 1077: 1065: 1064: 1056: 1054: 1037: 1033: 1027: 1018: 1013: 1009: 1005: 1001: 994: 992: 990: 988: 979: 975: 971: 967: 963: 959: 952: 943: 935: 931: 927: 923: 919: 915: 911: 907: 906:MIS Quarterly 903: 896: 890: 886: 883: 877: 858: 854: 850: 843: 836: 829: 825: 822: 816: 812: 802: 799: 797: 794: 792: 789: 788: 779: 776: 773: 772: 771: 768: 765: 760: 758: 748: 746: 736: 734: 730: 726: 722: 718: 708: 706: 699:United States 694:North America 691: 689: 680: 678: 663: 660: 651: 648: 644: 631: 628: 625: 622: 619: 616: 613: 610: 609: 608: 595: 592: 589: 586: 583: 575: 573: 572:Bootstrapping 568: 564: 560: 555: 551: 547: 545: 541: 536: 533: 521: 516: 514: 509: 507: 502: 501: 499: 498: 495: 490: 485: 484: 477: 476: 472: 470: 469: 460: 459: 453: 452: 445: 444:Protocol Wars 442: 440: 437: 435: 432: 430: 427: 426: 420: 419: 410: 407: 406: 405: 402: 400: 399:Voice over IP 397: 395: 392: 390: 387: 385: 382: 380: 377: 375: 372: 370: 369:File transfer 367: 365: 362: 360: 357: 355: 352: 348: 347:Microblogging 345: 344: 343: 340: 339: 333: 332: 325: 322: 320: 317: 315: 312: 310: 307: 303: 300: 298: 295: 294: 293: 290: 288: 285: 283: 280: 278: 275: 274: 271: 266: 265: 258: 255: 253: 250: 248: 245: 243: 240: 238: 235: 233: 230: 229: 226: 221: 220: 213: 210: 208: 205: 203: 200: 198: 195: 193: 190: 188: 185: 183: 180: 178: 175: 173: 170: 168: 165: 163: 160: 158: 155: 153: 150: 148: 145: 143: 140: 138: 137:Data activism 135: 133: 130: 128: 125: 123: 120: 119: 113: 112: 107: 106:routing paths 103: 97: 93: 92: 89: 86: 85: 82: 74: 71: 63: 53: 49: 43: 40:This article 38: 29: 28: 19: 1251: 1247: 1224: 1220: 1202:(1): 49–61. 1199: 1195: 1173:. Retrieved 1169:the original 1164: 1140:. Retrieved 1136:the original 1131: 1110: 1087: 1062: 1040:. Retrieved 1035: 1026: 1007: 1004:First Monday 1003: 961: 957: 951: 942: 909: 905: 895: 876: 866:17 September 864:. Retrieved 857:the original 852: 848: 835: 815: 769: 761: 754: 742: 719:established 714: 702: 686: 674: 661: 657: 640: 614:Transparency 611:Embeddedness 606: 593: 590: 587: 584: 581: 556: 552: 548: 537: 531: 529: 473: 461: 364:File sharing 269: 102:Opte Project 81: 66: 60:January 2018 57: 41: 1254:(2): 1–18. 578:Definitions 202:Vigilantism 187:Slacktivism 1295:Categories 1227:(1): 1–3. 1188:References 1175:25 October 1142:25 October 1042:25 October 603:Dimensions 394:Television 314:IP address 225:Governance 132:Censorship 926:0276-7783 192:Sociology 142:Democracy 978:10520480 934:30831820 885:Archived 824:Archived 785:See also 598:Theories 563:LinkedIn 559:Facebook 439:Pioneers 389:Shopping 384:Podcasts 336:Services 127:Activism 88:Internet 1128:"USAID" 707:(NII). 567:MySpace 475:Outline 423:History 177:Privacy 157:Freedom 116:General 46:Please 1098:  976:  932:  924:  751:Africa 739:Europe 721:CA*net 711:Canada 456:Guides 409:search 122:Access 1281:ASEAN 1248:Poroi 1221:Poroi 1092:(PDF) 1067:(PDF) 1010:(8). 974:S2CID 930:S2CID 860:(PDF) 845:(PDF) 807:Notes 757:USAID 468:Index 374:Games 354:Email 342:Blogs 247:ICANN 197:Usage 1286:APEC 1177:2011 1144:2011 1096:ISBN 1044:2011 922:ISSN 868:2010 762:The 715:The 675:The 671:Asia 565:and 257:ISOC 252:IETF 242:IANA 1256:doi 1229:doi 1204:doi 1012:doi 966:doi 914:doi 530:An 359:Fax 237:NRO 232:IGF 100:An 50:to 1297:: 1252:10 1250:. 1246:. 1223:. 1219:. 1200:32 1198:. 1163:. 1152:^ 1130:. 1119:^ 1075:^ 1052:^ 1034:. 1006:. 1002:. 986:^ 972:. 960:. 928:. 920:. 910:37 908:. 904:. 851:. 847:. 733:T3 729:T1 645:, 561:, 546:. 1264:. 1258:: 1237:. 1231:: 1225:8 1210:. 1206:: 1179:. 1146:. 1104:. 1046:. 1020:. 1014:: 1008:5 980:. 968:: 962:7 936:. 916:: 870:. 853:3 519:e 512:t 505:v 73:) 67:( 62:) 58:( 44:. 20:)

Index

Information Infrastructure
help improve it
make it understandable to non-experts
Learn how and when to remove this message
Internet
Visualization of Internet routing paths
Opte Project
routing paths
Access
Activism
Censorship
Data activism
Democracy
Digital divide
Digital rights
Freedom
Freedom of information
Internet phenomena
Net neutrality
Privacy
Right to Internet access
Slacktivism
Sociology
Usage
Vigilantism
Virtual community
Virtual volunteering
Governance
IGF
NRO

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.