In the buzzing hive of the tech industry, it’s common to see organizations always chasing the latest trends. Whether it’s the allure of „agility“, the appeal of a „startup-like“ office culture, or the promise of the „Spotify model“, these fads are hungrily devoured. However, this frenzy often leads to what’s known as „cargo cult“ behavior: adopting the latest trends in name only, without truly implementing or understanding their fundamental concepts.

For the uninitiated, the term “cargo cult” originates from the behavior of indigenous tribes who, after World War II, replicated military-style landing strips hoping to receive supplies – they copied the practices they saw without understanding the underlying reasons behind them . In the context of IT, cargo cult refers to a situation where an organization attempts to mimic the success of others without understanding the principles that made them successful in the first place. Picture an organization implementing a cutting-edge cloud computing solution based on microservices without understanding its architecture or requirements—this is a cargo cult.

The Dangers of Cargo Cult Behavior

The risk of such behavior lies not merely in their superficiality. It can actively undermine innovation and progress, spreading confusion and dissatisfaction within teams. Imagine a team implementing agile methodologies, yet still stuck in bureaucratic red tape. Or consider an organization that redesigns its office to look like Google’s in hope of attracting new talent, but retains a rigid, traditional corporate culture. These actions can lead to disillusionment, stagnation, and a loss of faith in leadership.

Cargo cults in IT are more than just organizational fads. They represent a dangerous dysfunction, often rooted in non-rational or irrational foundations, causing misconceptions and malpractices in the team. They occur when a team, either due to intrinsic or extrinsic motivation, unconsciously fails in their attempt to replicate the circumstances and success of others.

Consider a team trying to replicate a successful cloud-based infrastructure of another organization, without understanding the intricacies of its design, deployment, and maintenance. They see the success but fail to comprehend the underlying principles and practices that led to it. This is cargo cult.

In such cases, the danger is not only the superficiality of the implementation but also the underlying misconceptions that can lead to severe malpractices. A poorly understood and implemented cloud architecture could lead to serious security vulnerabilities, inefficient resource utilization, and ultimately, a failed attempt at replicating someone else’s success.

How to identify misguided initiatives

Identifying cargo cults requires a sharp eye and a sharper mind. The first step is to critically evaluate whether the implementation of a trend or tool has been done in letter or in spirit. Is the cloud computing solution being used effectively, or is it just an expensive ornament? Are agile practices truly improving workflow, or are they simply adding layers of unnecessary meetings? The true litmus test is whether these new introductions are adding value or merely complexity.

In the analytical framework presented in the paper, “Cargo Cults in Information Systems Development: A Definition and an Analytical Framework“ , the authors take a look at possible reasons for information systems development method implementation derailing and try to approach the root causes from an socio-anthropological perspective. They propose two dimensions for characterising cargo cults: rationality and motivation, each with two polarities, forming a matrix that helps identify and understand cargo cult behaviors.

Rationality refers to the level of rational thought involved in the adoption of a practice, methodology, IT architecture style, „way of work“ or new emerging technology. For the purpose of characterising cargo cult behaviors, this dimension only considers dysfunctional rationality.

  • Non-rational implies that there was little to no rational consideration given to the method’s rationale. The adoption is not based on a logical understanding of its principles, practices, or potential benefits. Rather, it’s often driven by superficial factors such as trends, hypes, or an uncritical imitation of successful cases.
  • Irrational refers to situations where an attempt at reasoning was made but it was flawed or incorrect. The organization has tried to understand and implement the method based on its understanding, but this understanding is fundamentally wrong or incomplete. This could lead to misconceptions, malpractices, and ultimately, a failed implementation.

Motivation relates to the underlying reason, whether it’s driven by the inherent value of the method itself or by the expected outcomes.

  • Intrinsic Motivation denotes situations where a trend is adopted for its own sake. The motivation comes from within the organization, either because it aligns with its values, or simply because it wants to be part of the trend. Intrinsic motivation often reflects a desire to change or improve, but it can also lead to cargo cult behavior if the organization lacks a proper understanding of the method.
  • Extrinsic Motivation refers to cases where a trend is adopted with a specific goal or outcome in mind. The organization expects that the method will lead to certain benefits, such as increased efficiency, improved quality, or reduced costs. However, if these expectations are based on a faulty understanding of the method, it can result in a cargo cult situation.

The paper’s authors provide a nice definition for cargo cults in their context:

„A[n information systems development method] cargo cult is a temporally delimited dysfunction that can have a non-rational or an irrational foundation. It leads to misconceptions and malpractices and can be both intrinsically or extrinsically motivated as a[n information systems development] team unconsciously fails in an attempt to replicate the circumstances and success of others.“

By combining the two dimensions, the framework identifies four distinct types of cargo cults, each representing a different combination of rationality and motivation. This provides a useful tool for diagnosing and addressing cargo cult phenomena in the broader IT context.

  1. Affectual cargo cult: Here, organizations chase trends and hypes without considering the real implications. They may adopt the latest technology – be it a cloud solution, a machine learning algorithm, or a blockchain protocol – because it is popular or exciting, without truly understanding its use case, cost, or the effort required for successful implementation. Here, the organization is intrinsically motivated and operates non-rationally. It jumps on the agile bandwagon, swept away by the hype and trend, without a clear understanding of the effort and changes required. Affectual cargo cults may not last long, given that the initial enthusiasm often wanes unless it evolves into a more reasoned approach.
  2. Value cargo cult: In this quadrant, organizations are genuinely motivated to embrace the values promised by a particular IT practice or solution. They may want the flexibility of the cloud, the insights from big data, or the responsiveness of Agile, but they lack the know-how to operationalize these values effectively. Here, the organization intrinsically embraces the values but lacks the know-how to effectively implement them. Their desire to adopt the method or technology is strong, but their understanding of how to operationalize these values is weak, leading to issues in the implementation.
  3. Means-end cargo cult: Here, organizations have specific outcomes in mind and they believe that adopting a certain IT practice or solution will help them achieve these. They could aim for faster product cycles with Agile, enhanced decision-making with AI, or cost savings with cloud computing. However, their understanding of the chosen practice or solution is flawed, leading to misinterpretations and malpractices. This represents an organization that is extrinsically motivated and operates irrationally. They have clear goals – faster deliveries, less documentation, better customer communication – and attempt to align the method or technology to achieve these. However, due to misconceptions and malpractices, they fail to properly implement the required practices.
  4. Traditional cargo cult: In this quadrant, organizations maintain some traditional IT practices even as they adopt newer solutions. These legacy practices, which might have been effective in the past, coexist with newer methodologies and often hinder their effective implementation. This could include keeping old mainframes while moving to the cloud, or adhering to water(scrum)fall development as they try to implement Agile. Here, the organization has adopted several practices but also retained some old habits that are not in line with the new paradigm. These traditional practices are often unquestioned, as they have been effective in the past. However, they may impede the efficient implementation and result in cargo cult behavior.

By adapting this framework to the broader IT context, we can diagnose and address cargo cult behaviors more effectively, leading to more successful adoption of IT practices and solutions. In my next post, I will show some more examples for cargo cults often found in tech and provide some strategies how to remedy them.


1.
Bughin J, Zeebroeck N van. The Best Response to Digital Disruption. MIT SMR [Internet]. 2017 Apr 6 [cited 2023 Jul 10]; Available from: https://sloanreview.mit.edu/article/the-right-response-to-digital-disruption/
1.
De Geus, Arie P. Planning as Learning. Harvard Business Review. 1988;(March/April).
1.
Barnett WP, Hansen MT. The red queen in organizational evolution. Strategic Management Journal [Internet]. 1996 [cited 2023 Jul 10];17(S1):139–57. Available from: https://onlinelibrary.wiley.com/doi/abs/10.1002/smj.4250171010
1.
Derfus PJ, Maggitti PG, Grimm CM, Smith KG. The Red Queen Effect: Competitive Actions And Firm Performance. AMJ [Internet]. 2008 [cited 2023 Jul 10];51(1):61–80. Available from: http://journals.aom.org/doi/10.5465/amj.2008.30708624
1.
Scott J. The FoxMeyer Drugs’ Bankruptcy: Was it a Failure of ERP?
1.
Campbell M. What a Difference a Year Makes: Time Lag Effect of Information Technology Investment on Firm Performance. Journal of Organizational Computing and Electronic Commerce [Internet]. 2012 [cited 2023 Jul 3];22(3):237–55. Available from: http://www.tandfonline.com/doi/abs/10.1080/10919392.2012.696944
1.
Brynjolfsson E, Hitt L. Is information systems spending productive? New evidence and new results.
1.
Brynjolfsson E. The productivity paradox of information technology. Commun ACM [Internet]. 1993 Dezember [cited 2023 Jul 3];36(12):66–77. Available from: https://dl.acm.org/doi/10.1145/163298.163309
1.
Lin WT, Chuang CH. Investigating and comparing the dynamic patterns of the business value of information technology over time. European Journal of Operational Research [Internet]. 2013 [cited 2023 Sep 22];228(1):249–61. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0377221713000532
1.
Tallon PP, Kraemer KL, Gurbaxani V. Executives’ Perceptions of the Business Value of Information Technology: A Process-Oriented Approach. Journal of Management Information Systems [Internet]. 2000 [cited 2023 Sep 22];16(4):145–73. Available from: https://www.tandfonline.com/doi/full/10.1080/07421222.2000.11518269
1.
Thatcher ME, Pingry DE. Understanding the Business Value of Information Technology Investments: Theoretical Evidence from Alternative Market and Cost Structures. Journal of Management Information Systems [Internet]. 2004;21(2,):61–85. Available from: http://www.jstor.org/stable/40398692
1.
Shea VJ, Dow KE, Chong AYL, Ngai EWT. An examination of the long-term business value of investments in information technology. Inf Syst Front [Internet]. 2019 [cited 2023 Sep 22];21(1):213–27. Available from: http://link.springer.com/10.1007/s10796-017-9735-5
1.
Raman R, Grover V. Communicating the value of uncertain information technology investments using an options approach. IJBIS [Internet]. 2005 [cited 2023 Sep 22];1(1/2):129. Available from: http://www.inderscience.com/link.php?id=7404
1.
Otim S, Dow KE, Grover V, Wong JA. The Impact of Information Technology Investments on Downside Risk of the Firm: Alternative Measurement of the Business Value of IT. Journal of Management Information Systems [Internet]. 2012 [cited 2023 Sep 22];29(1):159–94. Available from: https://www.tandfonline.com/doi/full/10.2753/MIS0742-1222290105
1.
Giaglis GM, Mylonopoulos N, Doukidis GI. The ISSUE methodology for quantifying benefits from information systems. Logistics Information Management [Internet]. 1999 Feb 1 [cited 2023 Sep 21];12(1/2):50–62. Available from: https://www.emerald.com/insight/content/doi/10.1108/09576059910256259/full/html
1.
and behavior variables with the best fit statistics.
1.
Model 1 is the basic DID model without any control variables. Model 2 is the analysis result of adding demographic variables of sample enterprises, and model 3 is the analysis result of adding demographic variables.
1.
Rong K, Hu L. Complementary Assets, Organizational Modularization, and Platform Enterprise Value Innovation. Systems [Internet]. 2023 Jun 24 [cited 2023 Sep 16];11(7):323. Available from: https://www.mdpi.com/2079-8954/11/7/323
1.
Hughes A, Morton MSS. The Transforming Power of Complementary Assets. MIT Sloan Management Review. 2006;(Summer).
1.
Lee YS, Kim T, Choi S, Kim W. When does AI pay off? AI-adoption intensity, complementary investments, and R&D strategy. Technovation [Internet]. 2022 [cited 2023 Sep 16];118:102590. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0166497222001377
1.
Acemoglu D. Why Do New Technologies Complement Skills? Directed Technical Change and Wage Inequality. The Quarterly Journal of Economics [Internet]. 1998;113(4):1055–89. Available from: http://www.jstor.org/stable/2586974
1.
Liao WH, Chen PW, Kuai SC. A Resource Provision Strategy for Software-as-a-Service in Cloud Computing. Procedia Computer Science [Internet]. 2017 [cited 2023 Sep 16];110:94–101. Available from: https://linkinghub.elsevier.com/retrieve/pii/S1877050917313029
1.
Liao WH, Chen PW, Kuai SC. A Resource Provision Strategy for Software-as-a-Service in Cloud Computing. Procedia Computer Science [Internet]. 2017 [cited 2023 Sep 16];110:94–101. Available from: https://linkinghub.elsevier.com/retrieve/pii/S1877050917313029
1.
Modisane P, Jokonya O. Evaluating the benefits of Cloud Computing in Small, Medium and Micro-sized Enterprises (SMMEs). Procedia Computer Science [Internet]. 2021 [cited 2023 Sep 16];181:784–92. Available from: https://linkinghub.elsevier.com/retrieve/pii/S187705092100274X
1.
Loukis E, Janssen M, Mintchev I. Determinants of software-as-a-service benefits and impact on firm performance. Decision Support Systems [Internet]. 2019 [cited 2023 Sep 16];117:38–47. Available from: https://linkinghub.elsevier.com/retrieve/pii/S016792361830201X
1.
Androutsopoulou A, Karacapilidis N, Loukis E, Charalabidis Y. Transforming the communication between citizens and government through AI-guided chatbots. Government Information Quarterly [Internet]. 2019 [cited 2023 Sep 16];36(2):358–67. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0740624X17304008
1.
Wang Y, Chen Y, Wang N, Nevo S, Kou G, Alsaadi FE. Impact of the Strategic Role of IT on Explorative and Exploitative Innovation Activities: The Role of Environmental Uncertainty. Decision Sciences [Internet]. 2020 [cited 2023 Sep 6];51(3):542–74. Available from: https://onlinelibrary.wiley.com/doi/10.1111/deci.12377
1.
Wang N, Liang H, Ge S, Xue Y, Ma J. Enablers and inhibitors of cloud computing assimilation: an empirical study. INTR [Internet]. 2019 Dec 2 [cited 2023 Sep 6];29(6):1344–69. Available from: https://www.emerald.com/insight/content/doi/10.1108/INTR-03-2018-0126/full/html
1.
information resources from connected people and organizations (The Boston Consulting Group, 2009). It increases the customers’ participation and drives innovation of customer value proposition and industry value chains (Berman et al., 2012). It also facilitates the inter-organizational innovations that completely change the competition patterns (Loukis et al., 2017). This, contrast to the former, is a strategic innovation achieving the value of CC through exploration.
1.
Alternatively, firms invest in CC to build the cloud-based business models by connecting, sharing and combining.
1.
Firms adopt CC to improve the IT efficiency and enhance the operation agility (Iyer & Henderson, 2012) by low-cost and extensible IT services (The Boston Consulting Group, 2009; Mohammed et al., 2009) resulted from flexible IT resource and a pay-as-you-go mode (The Boston Consulting Group, 2009). This is an operational level efficiency improvement realizing CC value through exploitation.
1.
Bean THD and R. Generative AI at Mastercard: Governance Takes Center Stage [Internet]. 2023 [cited 2023 Sep 5]. Available from: https://app.sloanreview.mit.edu/2023/08/30/generative-ai-at-mastercard-governance-takes-center-stage/content.html
1.
Jesitus J. Broken promises? Industry Week/IW. 1997;246(20):31–4.
1.
Although a lack of management commitment can result in project failure, management over-commitment can be even more disastrous. It can cause errors in judgment and lead to project escalation.
1.
In other words, FoxMeyer should have reengineered its business practices to be compatible with the capabilities of the technology at that time.
1.
There are high risks involved when adopting new technologies, especially in a unique situation that vendors cannot adequately test prior to actual use. On the other hand, customers should be aware of the risks and be compensated with discounts or other incentives for early adoption.
1.
Wong A, Scarbrough H, Chau P, Davison R. Critical Failure Factors in ERP Implementation.
1.
12 famous ERP disasters, dustups and disappointments [Internet]. CIO. [cited 2023 Sep 4]. Available from: https://www.cio.com/article/278677/enterprise-resource-planning-10-famous-erp-disasters-dustups-and-disappointments.html
1.
Customer blames bankruptcy on IBM IT failure [Internet]. ZDNET. [cited 2023 Sep 4]. Available from: https://www.zdnet.com/article/customer-blames-bankruptcy-on-ibm-it-failure/
1.
Akhmadalieva Z, Akhmadalieva Z. Impact of Digitalization on Firms’ Productivity. Proceedings of the 6th International Conference on Future Networks & Distributed Systems [Internet]. 2022 Dec 15 [cited 2023 Jul 23];364–9. Available from: https://dl.acm.org/doi/10.1145/3584202.3584254
1.
Meadows D. Thinking in Systems. Chelsea Green Publishing; 2008. 242 p.
1.
The Open Group. Cloud Buyers’ Decision Tree [Internet]. [cited 2023 Aug 26]. Available from: https://publications.opengroup.org/downloadable/download/link/id/MC43NzU1MDcwMCAxNjkzMDYxODU5MjE0MDk2MTIxODc4NjAzMzQ%2C/
1.
The Open Group. Cloud Buyers’ Requirements Questionnaire [Internet]. [cited 2023 Aug 26]. Available from: https://publications.opengroup.org/downloadable/download/link/id/MC4zMTg3MzQwMCAxNjkzMDYxODUyMjE0MDk1ODIxODc4NTczMzU%2C/
1.
The Open Group. Strengthening your Business Case for Using Cloud [Internet]. [cited 2023 Aug 26]. Available from: https://publications.opengroup.org/downloadable/download/link/id/MC4wMjU5MzcwMCAxNjkzMDYxODQ0MjE0MDk1NTIxODc4NTQzMzM%2C/
1.
The Open Group. Building Return on Investment from Cloud Computing [Internet]. [cited 2023 Aug 26]. Available from: https://publications.opengroup.org/downloadable/download/link/id/MC4yNDYyMzUwMCAxNjkzMDYxODMxMjE0MDk1MjIxODc4NTEzMzE%2C/
1.
The Open Group. An Architectural View of Security for Cloud.
1.
The Open Group. FAIR – ISOIEC 27005 Cookbook.
1.
The Open Group. Cloud Computing Explained [Internet]. [cited 2023 Aug 26]. Available from: https://publications.opengroup.org/downloadable/download/link/id/MC4zMTkzNDYwMCAxNjkzMDYxODY4MjE0MDk2NDIxODc4NjMxMTk%2C/
1.
Blevins T, Lounsbury D, Kirk M, Harding C. Cloud Computing Business Scenario Workshop.
1.
Sandholm T, Lee D. Notes on Cloud computing principles. J Cloud Comp [Internet]. 2014 [cited 2023 Aug 26];3(1):21. Available from: http://www.journalofcloudcomputing.com/content/3/1/21


0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.