Premium
The use of domination and legitimation in information systems implementation
Author(s) -
Hussain Zahid I.,
Cornelius Nelarine
Publication year - 2009
Publication title -
information systems journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 2.635
H-Index - 89
eISSN - 1365-2575
pISSN - 1350-1917
DOI - 10.1111/j.1365-2575.2008.00322.x
Subject(s) - legitimation , consolidation (business) , credibility , hierarchy , knowledge management , information system , structuration theory , legitimacy , duality (order theory) , sociology , political science , business , public relations , computer science , politics , accounting , law , mathematics , discrete mathematics
In this paper, we present the results of a longitudinal case study on information systems (IS) implementation conducted in a community healthcare organization. Using structuration theory as a sensitizing framework, we highlight how the information technology (IT) Management improved their influence through gaining legitimation from other organizational stakeholders, and how the nature of this evolved over time. Our results highlight how an appropriate, sophisticated use of what Giddens refers to as the duality of structure contributed to the consolidation of the IT Manager's credibility and authority. We also report on how the IT Management had most of their actions legitimated as an integral element of their actions. The results also highlight the distributed nature of power, such that even those at the lower end of organizational hierarchy were able to influence the success or failure of IS implementation.