recommended reading

Analysis: The Federalist IT Papers

Few chief information officers would look to the founding fathers for information technology leadership advice. In fact, many would be skeptical of insights from men who did their best work with a quill pen and communicated only by letters or in-person meetings. This is partly because IT leaders often underestimate the importance of effective governance and overestimate the importance of technology in business technology decisions. 

Technology selection is rarely the primary cause of derailment for IT strategies, programs or leaders, CEB’s research and experience working with hundreds of IT executives has confirmed.  Instead, effective IT governance is the defining characteristic of organizations that best use technology to achieve their mission. High performing enterprises are deliberate and purposeful about allocating their scarce human and financial resources among a constantly shifting and seemingly limitless set of demands.

Potential changes in federal IT authority and accountability are coming at a time of extreme cost management pressures. Executive mandates require reductions in IT budgets, and Congress is increasingly suspicious of the effectiveness of IT spending. Should the Senate pass the Federal Information Technology Acquisition Reform Act, known as FITARA, in the current form as approved by the House, agencies will be required to have only one CIO and accountability for investment and portfolio oversight will shift accordingly. These changes are likely to aggravate long-standing tensions between headquarters and component-level decision-making models.

As significant changes to IT governance take shape, federal IT executives should look to history for guidance in making decisions on effective governance. In The Federalist Papers, James Madison and Alexander Hamilton supported the sharing of power between a federal governing body and its states while arguing that the benefits of cohesive central power outweigh the risks of limits to local autonomy. As IT leaders define the boundaries of appropriate roles for the Office of Management and Budget, headquarters CIOs and component CIOs in determining IT policy, they would be well served to revisit some of the foundational governance roles that Madison and Hamilton chronicled.

Three common themes from The Federalist Papers outlined below describe key roles of a central governing authority and provide some parallel examples for government IT leaders today.

  • Original Federal Role #1 – Consolidate Power to Negotiate External Agreements and Treaties
  • Founders’ Action: Creation of the Department of Foreign Affairs to negotiate external treaties
  • Federal IT Equivalent Role: Consolidate purchasing power to improve negotiating leverage for external contracts
  • Current Mandates: FITARA and the Federal Strategic Sourcing Initiative
  • Goals: To ensure that Agency-level CIOs reduce duplication and waste by creating enterprisewide contracts and leveraging their collective purchasing power
  • Original Federal Role #2 – Establish a Common Currency and Infrastructure to Facilitate Internal Trade
  • Founders’ Action: Creation of the Department of Treasury and a common currency to facilitate trade of goods across state lines
  • Federal IT Equivalent Role: Establish common data standards to facilitate exchange of information across agency silos
  • Current Mandates: Open Data and Digital Governance directives from OMB
  • Goals: To establish common data standards and application programming intervaces, or APIs, to ensure that information can travel across different agencies to improve the quality of decision-making
  • Original Federal Role #3 – Create a Shared Defense Department to Protect our National Perimeter from External Threats
  • Founders’ Action: Creation of the Department of War in 1789 to provide for “the common defence [sic] of the members—the preservation of the public peace as well against internal convulsions as external attacks.”
  • Federal IT Equivalent Role: Strengthen the defense of our information assets from cybersecurity threats
  • Current Mandates: Cross-Agency Priority on Cybersecurity, Information Technology Workforce Assessment for Cybersecurity
  • Goals: To ensure that Agency headquarters CIOs have the power and authority to consistently define information security protocols across the enterprise to provide better defense around advanced persistent threats

Madison’s and Hamilton’s persuasive insights are relevant and valuable to today’s IT leaders as they navigate through similar internal debates. More than 200 years ago, they crafted a framework that accommodated diverse groups and has endured the strains of wars, civil rights and profound economic and demographic shifts. Though on a different scale, tensions over the central control of IT funds, data standards and protection against cyber threats reflect those historical debates. Just as Madison and Hamilton worked carefully to attain balance between central and local power for citizens, IT leaders must strive to find the best allocation of responsibilities and the most effective IT governance for agencies.

Kris van Riper is a managing director and Lon Zanetta is a senior executive advisor in CEB’s Government practice, where they support chief information officers and their leadership teams.

Threatwatch Alert

Stolen laptop

3.7M Hong Kong Voters' Personal Data Stolen

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.