Being a vigilante in any organization creates a reputation. You are known for being on the cutting edge but also for being a lone wolf. You are known for pushing the envelope but also for pushing an agenda. Mostly, you are known for doing things that no one else has the will to do, and that sword cuts both ways. If you are right, everyone will see you as a visionary, and if you are wrong, everyone will see you as a lunatic.
While it is possible to be a vigilante in any aspect, I propose that the most dangerous type of vigilante is the one that sets up infrastructure for other vigilantism. The type of vigilante I am referring to does screencasts of how to set up Google Apps for your Domain for every part of your organization without involving the IT department. The infrastructure vigilante will set up twitter accounts and hash tags for organizations that they do not control. They will request backchannels for every PD session. They will take notes collaboratively with everyone attending the meeting without asking the head of the meeting’s permission.
In short, an infrastructure vigilante is someone who doesn’t believe that she needs an invitation to collaborate, create, or add value. She is actively looking for ways in which her own workflow can be leveraged for the good of everyone she deals with on a daily basis. She is a walking hyperlink, subverting hierarchy everywhere she goes.
And yet, she isn’t able to work in groups the ways in which they are fashioned. She doesn’t work well with others when she can’t actually use her network and her collaborative tools. When she is bound to the piece of paper in front of her and the rigid agenda, she retreats. When her values of co-creation are not valued, she has a hard time relating to the process.
There are even some people who hate her kind of vigilantism. There are people who seek to get her in trouble because she won’t use the applications that “everyone else is using”. These people are looking for any reason to catch her in living too close to the edge. They bring up privacy concerns and IP infringement arguments. They talk about her being the one who makes everyone else feel like they have to catch up. They want her to know her place and stop trying to “help” everyone.
So, when is her vigilantism justified? Whenever there are people who want to help kids to learn and need a path to do so. Whenever coworkers want to learn from one another. Whenever a a group has an artificial hierarchy. Whenever teaching someone to fish actually causes them to teach others to fish. That is when infrastructure vigilantism is justified. That is when it makes sense to ignore the protocols and pursue a different course.
So, set up systems. Pursue workflow. Buzz. Tweet. Link.