BRADFORD SCHOLARS

    • Sign in
    View Item 
    •   Bradford Scholars
    • Management and Law
    • Management and Law Publications
    • View Item
    •   Bradford Scholars
    • Management and Law
    • Management and Law Publications
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of Bradford ScholarsCommunitiesAuthorsTitlesSubjectsPublication DateThis CollectionAuthorsTitlesSubjectsPublication Date

    My Account

    Sign in

    HELP

    Bradford Scholars FAQsCopyright Fact SheetPolicies Fact SheetDeposit Terms and ConditionsDigital Preservation Policy

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    The use of domination and legitimation in information systems implementation

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Publication date
    2009
    Author
    Hussain, Zahid I.
    Cornelius, Nelarine
    Keyword
    Domination; Information systems; IS; Community healthcare; Structuration theory; Legitimation; REF 2014
    Peer-Reviewed
    Yes
    
    Metadata
    Show full item record
    Abstract
    In this paper, we present the results of a longitudinal case study on information systems (IS) implementation conducted in a community healthcare organization. Using structuration theory as a sensitizing framework, we highlight how the information technology (IT) Management improved their influence through gaining legitimation from other organizational stakeholders, and how the nature of this evolved over time. Our results highlight how an appropriate, sophisticated use of what Giddens refers to as the duality of structure contributed to the consolidation of the IT Manager's credibility and authority. We also report on how the IT Management had most of their actions legitimated as an integral element of their actions. The results also highlight the distributed nature of power, such that even those at the lower end of organizational hierarchy were able to influence the success or failure of IS implementation.
    URI
    http://hdl.handle.net/10454/6026
    Version
    No full-text in the repository
    Citation
    Hussain ZI and Cornelius N (2009) The use of domination and legitimation in information systems implementation. Information Systems Journal. 19(2): 197-224.
    Link to publisher’s version
    http://dx.doi.org/10.1111/j.1365-2575.2008.00322.x
    Type
    Article
    Collections
    Management and Law Publications

    entitlement

     
    DSpace software (copyright © 2002 - 2023)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.