The use of domination and legitimation in information systems implementation
dc.contributor.author | Hussain, Zahid I. | * |
dc.contributor.author | Cornelius, Nelarine | * |
dc.date.accessioned | 2014-04-28T10:46:35Z | |
dc.date.available | 2014-04-28T10:46:35Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Hussain ZI and Cornelius N (2009) The use of domination and legitimation in information systems implementation. Information Systems Journal. 19(2): 197-224. | |
dc.identifier.uri | http://hdl.handle.net/10454/6026 | |
dc.description | No | |
dc.description.abstract | In this paper, we present the results of a longitudinal case study on information systems (IS) implementation conducted in a community healthcare organization. Using structuration theory as a sensitizing framework, we highlight how the information technology (IT) Management improved their influence through gaining legitimation from other organizational stakeholders, and how the nature of this evolved over time. Our results highlight how an appropriate, sophisticated use of what Giddens refers to as the duality of structure contributed to the consolidation of the IT Manager's credibility and authority. We also report on how the IT Management had most of their actions legitimated as an integral element of their actions. The results also highlight the distributed nature of power, such that even those at the lower end of organizational hierarchy were able to influence the success or failure of IS implementation. | en |
dc.subject | Domination | |
dc.subject | Information systems | |
dc.subject | IS | |
dc.subject | Community healthcare | |
dc.subject | Structuration theory | |
dc.subject | Legitimation | |
dc.subject | REF 2014 | |
dc.title | The use of domination and legitimation in information systems implementation | |
dc.status.refereed | Yes | |
dc.type | Article | |
dc.type.version | No full-text in the repository | |
dc.identifier.doi | https://doi.org/10.1111/j.1365-2575.2008.00322.x | |
dc.openaccess.status | closedAccess |