Being a vigilante in any organization creates a reputation. You are known for being on the cutting edge but also for being a lone wolf. You are known for pushing the envelope but also for pushing an agenda. Mostly, you are known for doing things that no one else has the will to do, and that sword cuts both ways. If you are right, everyone will see you as a visionary, and if you are wrong, everyone will see you as a lunatic.
While it is possible to be a vigilante in any aspect, I propose that the most dangerous type of vigilante is the one that sets up infrastructure for other vigilantism. The type of vigilante I am referring to does screencasts of how to set up Google Apps for your Domain for every part of your organization without involving the IT department. The infrastructure vigilante will set up twitter accounts and hash tags for organizations that they do not control. They will request backchannels for every PD session. They will take notes collaboratively with everyone attending the meeting without asking the head of the meetingâs permission.
In short, an infrastructure vigilante is someone who doesnât believe that she needs an invitation to collaborate, create, or add value. She is actively looking for ways in which her own workflow can be leveraged for the good of everyone she deals with on a daily basis. She is a walking hyperlink, subverting hierarchy everywhere she goes.
And yet, she isnât able to work in groups the ways in which they are fashioned. She doesnât work well with others when she canât actually use her network and her collaborative tools. When she is bound to the piece of paper in front of her and the rigid agenda, she retreats. When her values of co-creation are not valued, she has a hard time relating to the process.
There are even some people who hate her kind of vigilantism. There are people who seek to get her in trouble because she wonât use the applications that âeveryone else is usingâ. These people are looking for any reason to catch her in living too close to the edge. They bring up privacy concerns and IP infringement arguments. They talk about her being the one who makes everyone else feel like they have to catch up. They want her to know her place and stop trying to âhelpâ everyone.
So, when is her vigilantism justified? Whenever there are people who want to help kids to learn and need a path to do so. Whenever coworkers want to learn from one another. Whenever a a group has an artificial hierarchy. Whenever teaching someone to fish actually causes them to teach others to fish. That is when infrastructure vigilantism is justified. That is when it makes sense to ignore the protocols and pursue a different course.
So, set up systems. Pursue workflow. Buzz. Tweet. Link.
Related articles by Zemanta
- Web 2.0 Arrow to an Educatorâs Quiver (slideshare.net)
- Google Buzz Released (Think Friendfeed In Gmail) (blogoscoped.com)
- 3 Reasons Why Students Should Be Using Dropbox (makeuseof.com)
![Reblog this post [with Zemanta]](https://i0.wp.com/img.zemanta.com/reblog_e.png?w=1225)