{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T22:00:36Z","timestamp":1770674436226,"version":"3.49.0"},"reference-count":57,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,12,1]]},"abstract":"<jats:p>The recent managerial literature on the development of corporate infrastructures to deliver sophisticated and flexible IT capabilities is based on a set of assumptions concerning the role of management in strategy formulation, planning and control; the role of IT as a tool; the linkages between infrastructure and business processes; the implementation process. This paper deconstructs such assumptions by gradually enriching the conventional management agenda with new priorities stemming from other styles of taking care of infrastructures. The original, straightforward management agenda appears to be lacking: its foundations are irremediably shaken. The paper finally evokes a philosophy\u2010based agenda, the only one valuable in the uncharted territory where the usual foundations do not deliver any longer. Such an agenda speaks a language of weak agency: releasement; dwelling with mystery; capacity to drop the tools; valuing marginal practices. Will the last agenda play a key role in coping with the information infrastructures of the next millennium?<\/jats:p>","DOI":"10.1108\/09593849810246129","type":"journal-article","created":{"date-parts":[[2004,9,14]],"date-time":"2004-09-14T08:40:06Z","timestamp":1095151206000},"page":"305-327","source":"Crossref","is-referenced-by-count":117,"title":["From tool to <i>Gestell<\/i>"],"prefix":"10.1108","volume":"11","author":[{"given":"Claudio U.","family":"Ciborra","sequence":"first","affiliation":[]},{"given":"Ole","family":"Hanseth","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021820412239400_b1","unstructured":"Akrich, M. (1992), \u201cThe description of technical objects\u201d, in Bijker, W.E. and Law, J. (Eds), Shaping Technology\/Building Society, MIT Press, Cambridge, MA, pp. 205\u201024."},{"key":"key2022021820412239400_b2","unstructured":"Akrich, M and Latour, B. (1992), \u201cA summary of a convenient vocabulary for the semiotics of human and nonhuman assemblies\u201d, in Bijker, W.E. and Law, J. (Eds), Shaping Technology\/ Building Society, MIT Press, Cambridge, MA, pp. 259\u201064."},{"key":"key2022021820412239400_b3","unstructured":"Argyris, C. and Schoen, D. (1996), Organizational Learning II, Addison Wesley, Reading, MA."},{"key":"key2022021820412239400_b4","unstructured":"Arthur, B. (1988), \u201cSelf\u2010reinforcing mechanisms in economics\u201d, in Anderson, P.W.et al.(Eds), The Economy as an Evolving Complex System, Perseus Press, New York, NY."},{"key":"key2022021820412239400_b5","unstructured":"Arthur, B. (1996), \u201cIncreasing returns and the two worlds of business\u201d, Harvard Business Review, July\u2010August."},{"key":"key2022021820412239400_b6","doi-asserted-by":"crossref","unstructured":"Berg, M. (1997), \u201cOn forms, containers, and the electronic medical record: some tools for a sociology of the formal\u201d, Science, Technology and Human Values, Vol. 22 No. 4, pp. 403\u201031.","DOI":"10.1177\/016224399702200401"},{"key":"key2022021820412239400_b7","unstructured":"Bowker, G. and Star, S.L. (1994), \u201cKnowledge and infrastructure in international information management. Problems of classification and coding\u201d, in Bud\u2010Frierman, L. (Ed.), Information Acumen. The Understanding and Use of Knowledge in Modern Business, Routledge, New York, NY, pp. 187\u2010213."},{"key":"key2022021820412239400_b8","unstructured":"Braa, K. and Sandahl, T. (1998), \u201cDocuments in infrastructures \u2010 challenges for design\u201d, in Baets, W.R.J. (Ed.), Proceedings from 6th European Conference on Information Systems, Euro\u2010Arab Management School, Granada, Spain, pp. 1025\u201040."},{"key":"key2022021820412239400_b9","unstructured":"Broadbent, M. and Weill, P. (1997), \u201cManagement by maxim: how business and IT managers can create IT infrastructures\u201d, Sloan Management Review, Spring."},{"key":"key2022021820412239400_b10","unstructured":"Broadbent, M., Weill, P. and St Clair, D. (1995), \u201cThe role of IT infrastructure in business process redesign\u201d, CISR WP278, Sloan School of Management, May."},{"key":"key2022021820412239400_b11","unstructured":"Broadbent, M., Weill, P., O\u2019Brien, T. and Neo, B.S. (1996), \u201cFirm context and patterns of IT infrastructure capability\u201d, International Conference on Information Systems Proceedings, Cleveland, OH."},{"key":"key2022021820412239400_b12","unstructured":"Callon, M. (1987), \u201cSociety in the making: the study of technology as a tool for sociological analysis\u201d, in Bijker, W.E., Hughes, T.P. and Pinch, T. (Eds), The Social Construction of Technological Systems, MIT Press, Cambridge, MA, pp. 83\u2010106."},{"key":"key2022021820412239400_b13","doi-asserted-by":"crossref","unstructured":"Callon, M. (1991), \u201cTechno\u2010economic networks and irreversibility\u201d, in Law J. (Ed.), A Sociology of Monsters. Essays on Power, Technology and Domination, Routledge, New York, NY, pp. 132\u201061.","DOI":"10.1111\/j.1467-954X.1990.tb03351.x"},{"key":"key2022021820412239400_b14","doi-asserted-by":"crossref","unstructured":"Callon, M. (1994), \u201cIs science a public good?\u201d, Science, Technology & Human Values, Vol. 19 No. 4, pp. 395\u2010424.","DOI":"10.1177\/016224399401900401"},{"key":"key2022021820412239400_b15","unstructured":"Ciborra, C.U. (1994), \u201cFrom thinking to tinkering\u201d, in Ciborra, C.U. and Jelassi, T. (Eds), Strategic Information Systems, John Wiley & Sons, Chichester."},{"key":"key2022021820412239400_b16","unstructured":"Ciborra, C.U. (1996), \u201cIntroduction: what does groupware mean for the organizations hosting it?\u201d, in Ciborra, C. (Ed.), Groupware and Teamwork. Invisible Aid or Technical Hindrance?, John Wiley & Sons, Chichester."},{"key":"key2022021820412239400_b17","unstructured":"Ciborra, C.U. (1999), Corporate Networking \u2010 The Dynamics of Infrastructure in Large Multinationals(in press)."},{"key":"key2022021820412239400_b18","doi-asserted-by":"crossref","unstructured":"Ciborra, C.U. and Lanzara, G.F. (1994), \u201cFormative contexts and information technology\u201d, Journal of Accounting, Management and Information Technology, Vol. 4 No. 2.","DOI":"10.1016\/0959-8022(94)90005-1"},{"key":"key2022021820412239400_b19","doi-asserted-by":"crossref","unstructured":"Coase, R. (1960), \u201cThe problem of social cost\u201d, Journal of Law and Economics, Vol. 3.","DOI":"10.1086\/466560"},{"key":"key2022021820412239400_b20","unstructured":"Cordella, A. and Simon, K. (1997), \u201cDecreasing returns to infrastructure\u201d, IRIS Proceedings, Oslo.."},{"key":"key2022021820412239400_b21","unstructured":"Dahlbom, B. and Janlert, S. (1996), Computer Future, University of G\u00f8teborg."},{"key":"key2022021820412239400_b22","doi-asserted-by":"crossref","unstructured":"David, P.A. (1987), \u201cSome new standards for the economics in the information age\u201d, in Dasgupta, P. and Stoneman, P. (Eds), Economic Policy and Technological Performance, Cambridge University Press, Cambridge, pp. 206\u201039.","DOI":"10.1017\/CBO9780511559938.010"},{"key":"key2022021820412239400_b23","doi-asserted-by":"crossref","unstructured":"David, P.A. and Bunn, J.A. (1988), \u201cThe economics of gateways technologies\u201d, Information Economics and Policy, Vol. 3.","DOI":"10.1016\/0167-6245(88)90024-8"},{"key":"key2022021820412239400_b24","unstructured":"Dreyfus, H. (1982), What Computers Can\u2019t Do: The Limits of Artificial Intelligence, Harper & Row, New York, NY."},{"key":"key2022021820412239400_b25","doi-asserted-by":"crossref","unstructured":"Dreyfus, H.L. (1993), \u201cHeidegger in the connection between nihilm, art, technology and politics\u201d, in Guignon, C. (Ed.)Heidegger, Cambridge University Press, Cambridge.","DOI":"10.1017\/CCOL0521385709.012"},{"key":"key2022021820412239400_b26","doi-asserted-by":"crossref","unstructured":"Duncan, N.B. (1995), \u201cCapturing flexibility of IT infrastructure\u201d, Journal of Management Information Systems, Autumn, Vol. 12 No. 2","DOI":"10.1080\/07421222.1995.11518080"},{"key":"key2022021820412239400_b27","unstructured":"Ehn, P. (1989), Work\u2010Oriented Design of Computer Artifacts, Arbetslivscentrum, Stockholm."},{"key":"key2022021820412239400_b28","unstructured":"Feenberg, A. (1998), Radicalizing Philosophy of Technology, Radical Philosophy Review, forthcoming."},{"key":"key2022021820412239400_b29","doi-asserted-by":"crossref","unstructured":"Grindley, P. (1995), Standards, Strategy and Policy Costs, Oxford University Press, Oxford.","DOI":"10.1093\/acprof:oso\/9780198288077.001.0001"},{"key":"key2022021820412239400_b30","unstructured":"Hanseth, O. (1996), \u201cInformation technology as infrastructure\u201d, PhD thesis, University of G\u00f8teborg."},{"key":"key2022021820412239400_b31","doi-asserted-by":"crossref","unstructured":"Hanseth, O. and Monteiro, E. (1997), \u201cInscribing behavior in information infrastructure standards\u201d, Accounting, Management and Information Technologies, Vol. 7 No. 4, pp. 183\u2010211.","DOI":"10.1016\/S0959-8022(97)00008-8"},{"key":"key2022021820412239400_b32","unstructured":"Hanseth, O. and Monteiro, E. (1998), \u201cChanging irreversible networks\u201d, in Baets, W.R.J. (Ed.), Proceedings from 6th European Conference on Information Systems, Euro\u2010Arab Management School, Granada, Spain, pp. 1123\u201039."},{"key":"key2022021820412239400_b33","doi-asserted-by":"crossref","unstructured":"Hanseth, O., Monteiro, E. and Hatling, M. (1996), \u201cDeveloping information infrastructure standards: the tension between standardisation and flexibility\u201d, Science Technology and Human Values, Vol. 21 No. 4, Autumn, pp. 407\u201026.","DOI":"10.1177\/016224399602100402"},{"key":"key2022021820412239400_b34","unstructured":"Heidegger, M. (1957), Identitaet und Differenz, Neske, Stuttgart."},{"key":"key2022021820412239400_b35","unstructured":"Heidegger, M. (1977), Sein und Zeit, Klostermann, Frankfurt."},{"key":"key2022021820412239400_b36","unstructured":"Heidegger, M. (1978), Basic Writings, Routledge, London."},{"key":"key2022021820412239400_b37","unstructured":"Heidegger, M. (1992), Gelassenheit, Neske, Stuttgart."},{"key":"key2022021820412239400_b38","unstructured":"Heidegger, M. (1994), Bremer und Freiburger Fortraege (1949), Klostermann, Frankfurt."},{"key":"key2022021820412239400_b39","unstructured":"Henderson, J.C., Venkatraman, N. and Oldach, S. (1996), \u201cAligning business and IT strategies\u201d, in Luftman, J. (Ed.), Strategic Alignment, Oxford University Press, Oxford."},{"key":"key2022021820412239400_b40","unstructured":"Hughes, T.P. (1983), Networks of Power: Electrification in Western Society, 1880\u20101930, John Hopkins University Press, Baltimore, MA."},{"key":"key2022021820412239400_b41","unstructured":"Hughes, T.P. (1987), \u201cThe evolution of large technical systems\u201d, in Bijker, W.E., Hughes, T.P. and Pinch, T.The Social Construction of Technological Systems, MIT Press, Cambridge, MA, pp. 51\u201082."},{"key":"key2022021820412239400_b42","unstructured":"Hughes, T.P. (1994), \u201cTechnological momentum\u201d, in Smith, M.R. and Marx, L. (Eds), Does Technology Drive History? The Dilemma of Technological Determinism, MIT Press, Cambridge, MA, pp. 101\u201014."},{"key":"key2022021820412239400_b43","doi-asserted-by":"crossref","unstructured":"Introna, L. (1997), Information, Management and Power, Macmillan, London.","DOI":"10.1007\/978-1-349-14549-2_4"},{"key":"key2022021820412239400_b44","doi-asserted-by":"crossref","unstructured":"Kallinikos, J. (1995), \u201cThe architecture of the invisible: technology as representation\u201d, Organizations, Vol. 2 No. 1.","DOI":"10.1177\/135050849521006"},{"key":"key2022021820412239400_b45","doi-asserted-by":"crossref","unstructured":"Katz, M. and Shapiro, C. (1986), \u201cTechnology adoption in the presence of network externalities\u201d, Journal of Political Economy, Vol. 94.","DOI":"10.1086\/261409"},{"key":"key2022021820412239400_b46","unstructured":"Keen, P.W. (1991), Shaping the Future, Harvard Business School Press, Boston, MA."},{"key":"key2022021820412239400_b47","unstructured":"Latour, B. (1987), Science in Action, Open University Press, Buckingham."},{"key":"key2022021820412239400_b48","doi-asserted-by":"crossref","unstructured":"Latour, B. (1991), \u201cTechnology is society made durable\u201d, in Law, J. (Ed.), A Sociology of Monsters. Essays on Power, Technology and Domination, pp. 103\u201031. Routledge, New York, NY.","DOI":"10.1111\/j.1467-954X.1990.tb03350.x"},{"key":"key2022021820412239400_b49","doi-asserted-by":"crossref","unstructured":"Latour, B. and Woolgar, S. (1986), Laboratory Life: The Construction of Scientific Facts, Princeton University Press, Princeton, NJ (first edition 1979).","DOI":"10.1515\/9781400820412"},{"key":"key2022021820412239400_b50","unstructured":"Luftman, J. (Ed.) (1996), Strategic Alignment, Oxford University Press, Oxford."},{"key":"key2022021820412239400_b51","doi-asserted-by":"crossref","unstructured":"Monteiro, E. and Hanseth, O. (1995), \u201cSocial shaping of information infrastructure: on being specific about the technology\u201d, in Orlikowski, W., Walsham, G., Jones, M.R. and DeGross, J.I. (Eds), Information Technology and Changes in Organisational Work, Chapman & Hall, London, pp. 325\u201043.","DOI":"10.1007\/978-0-387-34872-8_20"},{"key":"key2022021820412239400_b52","unstructured":"Rosenberg, N. (1994), Explaining the Black Box, Cambridge University Press, Cambridge."},{"key":"key2022021820412239400_b53","doi-asserted-by":"crossref","unstructured":"Star, S.L. and Ruhleder, K. (1996), \u201cSteps towards an ecology of infrastructure: design and access for large information spaces\u201d, Information Systems Research, Vol. 7 No. 1, pp. 111\u201034.","DOI":"10.1287\/isre.7.1.111"},{"key":"key2022021820412239400_b54","doi-asserted-by":"crossref","unstructured":"Timmermans, S. and Berg, M. (1997), \u201cStandardization in action: achieving universalism and localization in medical protocols\u201d, Social Studies of Science, Vol. 27, pp. 273\u2010305.","DOI":"10.1177\/030631297027002003"},{"key":"key2022021820412239400_b55","unstructured":"Unger, R.M. (1987), False Necessity, Cambridge University Press, Cambridge."},{"key":"key2022021820412239400_b56","unstructured":"Weill, P., Broadbent, M. and St Clair, D. (1996), \u201cIT value and the role of IT infrastructure\u201d, in Luftman, J. (Ed.), Strategic Alignment, Oxford University Press, Oxford."},{"key":"key2022021820412239400_b57","doi-asserted-by":"crossref","unstructured":"Winograd, T. and Flores, F. (1987), Understanding Computers and Cognition, Addison Wesley, Reading, MA.","DOI":"10.1016\/0004-3702(87)90026-9"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593849810246129","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593849810246129\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593849810246129\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:37:29Z","timestamp":1753403849000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/11\/4\/305-327\/183119"}},"subtitle":["Agendas for managing the information infrastructure"],"short-title":[],"issued":{"date-parts":[[1998,12,1]]},"references-count":57,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,12,1]]}},"alternative-id":["10.1108\/09593849810246129"],"URL":"https:\/\/doi.org\/10.1108\/09593849810246129","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[1998,12,1]]}}}