Abstract
This research examines the legitimation process that was undertaken to gain stakeholder support for the development of a smartcard system for student services at a local university in China. We employed a theoretical framework consisting of Suchman's typology of legitimacy and the Legitimation Activity Model (LAM) for sense-making of the process. We obtained insights into how legitimation of the system was gained, maintained and repaired through the project team's strategic actions. We conceptualized the rotation of legitimation gaining, maintaining and repairing activities in the project and make suggestions for improving the LAM. We emphasize that monitoring and evaluating legitimation is a dynamic, continuous process, involving the concept of legitimation status, and linking the planned actions of legitimation- gaining and responsive actions for legitimation maintaining and repairing. We suggest that to achieve legitimation for information systems, managers should plan strategies to construct and present an appropriate image of the system, in which stakeholders perceive that it meets their needs, and, in addition, closely monitor the status of legitimation granted over a continuous period. This is because legitimation is a ‘fragile flower’ that may wilt if not attended to adequately.
Similar content being viewed by others
References
Ajzen I (1985) From intentions to actions: a theory of planned behavior. In Action Control: From Cognition to Behavior (Kuhl J and Beckmann J, Eds), pp 11–39, Springer Verlag, New York.
Aldrich HE and Fiol CM (1994) Fools rush in? The institutional context of industry creation. Academy of Management Review 19 (4), 645–670.
Ash JS, Anderson JG, Gorman PN, Zielstorff RD, Norcross N and Petit J (2000) Managing change: an analysis of a hypothetical case. Journal of the American Medical Informatics Association 7, 125–134.
Ashforth BE and Gibbs BW (1990) The double-edge of organizational legitimation. Organization Science 1 (2): 177–194.
Avison D and Young T (2007) Time to rethink health care and ICT. Communications of the ACM 50 (6), 69–74.
Bansler JP and Havn EC (2004) Improvisation in information systems development. In Information Systems Research, Relevant Theory and Informed Practice (Kaplan B, Truex III D, Wastell D, Wood-Harper T and DeGross JI, Eds), pp 631–648, Kluwer, London.
Banville C (1991) A study of legitimacy as a social dimension of organizational information systems. In Information Systems Research: Contemporary Approaches and Emergent Traditions (Nissen HE, Klein HK and Hirschheim R, Eds), pp 107–129, North-Holland, Amsterdam.
Barki H and Hartwick J (1994) Measuring user participation, user involvement, and user attitude. MIS Quarterly 18 (1), 59–82.
Berger PL and Luckmann T (1966) The Social Construction of Reality: A Treatise in the Sociology of Knowledge. Penguin Books, London.
Bhattacherjee A and Hikmet N (2007) Physicians’ resistance toward healthcare information technology: a theoretical model and empirical test. European Journal of Information System 16, 725–737.
Blaikie N (2000) Designing Social Research. Polity Press, Cambridge.
Boudreau M and Robey D (2005) Enacting integrated information technology: a human agency perspective. Organisation Science 16 (1), 3–18.
Brown AD (1995) Managing understandings: politics, symbolism, niche marketing and the quest for legitimacy in IT implementation. Organization Studies 16 (6), 951–969.
Brown AD (1998) Narrative, politics and legitimacy in an IT implementation. Journal of Management Studies 35 (1), 35–58.
Brown SA, Massey AP, Montoya-Weiss MM and Burkman JR (2002) Do I really have to? User acceptance of mandated technology. European Journal of information Systems 11, 283–295.
Buchanan DA and Bryman A (2009) The SAGE Handbook of Organizational Research Methods. Sage, California.
Chakravarthy BS (1997) Managing corporate transformation: two contrasting leadership styles. In Strategy, Structure and Styles (Thomas H, O’Neal D and Ghertman M, Eds), pp 69–84, Wiley, Chichester.
Chakravarthy BS and Gargiulo M (1998) Maintaining leadership legitimacy in the transition to new organizational forms. Journal of Management Studies 35 (4), 437–456.
Chiasson MW and Davidson E (2004) Pushing the contextual envelope: developing and diffusing IS theory for health information systems research. Information and Organization 14 (3), 155–188.
Chin WW and Lee MKO (2000) A proposed model and measurement instrument for the formation of IS satisfaction: the case of end-user computing satisfaction. In Proceedings of the 21st International Conference on Information Systems (Orlikowski WJ, Ang S, Weill P, Krcmar HC and Degross JI, Eds), pp 553–563, Association for Information Systems, Atlanta, GA.
Davidson E (2002) Technology frames and framing: a socio-cognitive investigation of requirements determination. MIS Quarterly 26 (4), 329–358.
Davidson E (2006) A technological frames perspective on information technology and organizational change. Journal of Applied Behavioral Science 42 (1), 23–39.
Davis F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 (3), 318–339.
Davis GB (1982) Claim: user-developed systems can be hazardous to your organization. Proceedings of 17th Annual Hawaii Conference on System Sciences, Honolulu, Hawaii.
Davis F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 (3), 318–339.
Della Fave LR (1991) Ritual and the legitimation of inequality. Sociological Perspectives 34 (1), 21–38.
Delone WH and Mclean ER (2003) The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems 19 (4), 9–30.
Dong L, Neufeld D and Higgins C (2009) Top management support of enterprise system applications. Journal of Information Technology 24, 55–80.
Eason K and Harker S (1988) The use of prototyping and simulation in the development of large-scale applications. The Computer Journal 31 (5), 420–425.
Eisenhardt KM (1989) Building theories from case study research. Academy of Management Review 14 (4), 532–550.
Elsbach KD (1994) Managing organizational legitimacy in the California cattle industry: the construction and effectiveness of verbal accounts. Administrative Science Quarterly 39 (1), 57–88.
Elsbach KD and Sutton RI (1992) Acquiring organizational legitimacy through illegitimate actions: a marriage of institutional and impression management theories. Academy of Management Journal 35 (4), 699–738.
European Commission (2009) eHealth in action: good practices in European countries. Information society and media, European Commission. [WWW document] http://ec.europa.eu/information_society/activities/health/docs/studies/2009good_eHealth-report.pdf (accessed 21 March 2009).
Ferneley EH and Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. European Journal of Information Systems 15 (4), 345–356.
Fishbein M and Ajzen I (1980) Understanding Attitudes and Predicting Social Behavior. Prentice-Hall, Englewood Cliffs, NJ.
Flynn D and Puarungroj W (2006) The dynamics of the legitimation process in an information systems project: an interpretive analysis. In Proceedings of 14th European Conference on Information Systems Goteborg, Sweden.
Flynn DJ and Hussain Z (2004) Seeking legitimation for an information system: a preliminary legitimation activity model. Working Paper, School of Informatics, University of Manchester.
Gefen D and Riding CM (2003) IT acceptance: managing user-IT group boundaries. The DATA BASE for Advances in Information Systems 34 (3), 25–40.
Giddens A (1984) The Constitution of Society: Outline of the Theory of Structuration. Polity Press, Cambridge, UK.
Glaser BG and Strauss AL (1967) The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine, Chicago.
Glick W, Huber G, Miller C, Doty D and Sutcliffe K (1990) Studying changes in organizational design and effectiveness: retrospective event histories and periodic assessments. Organization Science (1), 293–312.
Goodhue DL and Thompson RL (1995) Task-technology fit and individual performance. MIS Quarterly 19 (2), 213–236.
Habermas J (1973) Legitimation Crisis. Beacon Press, Boston, MA.
Hannan MT and Freeman J (1986) Where do organizational forms come from? Sociological Forum 1 (1), 50–72.
Herriott R and Firestone W (1983) Multisite qualitative policy research: optimizing description and generalizability. Educational Researcher (12), 14–19.
Hirschheim R and Newman M (1988) Information systems and user resistance: theory and practice. The Computer Journal 31 (5), 398–408.
Hunt CS and Aldrich HE (1996) Why even Rodney Danger-Held has a home page: legitimizing the world wide web as a medium for commercial endeavours. Paper presented at the annual meeting of the Academy of Management, Cincinnati, OH.
Hussain Z and Cornelius N (2009) The use of domination and legitimation in information systems implementation. Information Systems Journal 19, 197–224.
Hussain Z, Taylor A and Flynn D (2004) A case study of the process of achieving legitimation in information system development. Journal of Information Science 30 (5), 408–417.
Jasperson J, Butler BS, Carte TA, Cross HJ, Saunders CS and Zheng W (2002) Review: power and information technology research: a metatriangulation review. MIS Quarterly 26, 397–459.
Jensen TB and Aanestad M (2007) Hospitality and hostility in hospitals: a case study of an EPR adoption among surgeons. European Journal of Information Systems 16, 672–680.
Jiang JJ, Muhanna WA and Klein G (2000) User resistance and strategies for promoting acceptance across systems types. Information & Management 37, 25–36.
Kaarst-Brown ML and Robey D (1999) More on myth, magic and metaphor: cultural insights into the management of information technology in organizations. Information Technology & People 12 (2), 192–217.
Kaganer E, Pawlowski SD and Wiley-Patton S (2010) Building legitimacy for IT innovations: the case of computerized physician order entry systems. Journal of the Association of Information Systems 11 (1), 1–33.
Kaplan B (1997) Addressing organizational issues into the evaluation of medical systems. Journal of the American Medical Informatics Association 4, 94–101.
Keable M, Landry M and Banville C (1998) The legitimacy gap between IS professionals and users. Communications of the ACM 41 (5), 146–156.
Keil M (1995) Pulling the plug: software project management and the problem of project escalation. MIS Quarterly 19, 421–447.
Keil M and Robey D (2001) Blowing the whistle on troubled software projects. Communications of the ACM 44 (4), 87–93.
Klein HK and Hirschheim RA (1989) Legitimation in information systems development: a social change perspective. Office, Technology and People 5 (1), 29–46.
Kohli R and Kettinger WJ (2004) Informating the clan: controlling physicians’ costs and outcomes. MIS Quarterly 28 (3), 363–394.
Lee AS and Baskerville RL (2003) Generalizing generalizability in information systems research. Information Systems Research 14 (3), 221–243.
Lewin K (1935) A Dynamic Theory of Personality. McGraw-Hill, New York.
Lyytinen K and Damsgaard J (1996) What's wrong with diffusion of innovation theory? The case of a complex and networked technology. In Diffusion and Adoption of Information Technology (Kautz K and Pries-Heje J, Eds), Chapman and Hall, London.
Mackay H (1995) Theorising the IT–society relationship. In Information Technology and Society: A Reader (Heap N, Thomas R, Einon G, Mason R and Mackay H, Eds), Sage/OU, London.
Markus ML (1983) Power, politics, and MIS implementation. Communications of the ACM 26 (6), 430–444.
Markus ML (2004) Technochange management: using IT to drive organizational change. Journal of Information Technology 19 (1), 4–20.
Myers MD and Young LW (1997) Hidden agendas, power and managerial assumptions in information systems development: an ethnographic study. Information Technology & People 10, 224–240.
Nadan RK (1997) The dialectic of management control: the case of the Fiji development bank. PhD Thesis, Bristol University.
Oliver C (1991) Strategic responses to institutional processes. Academy of Management Review 16 (1), 145–179.
Orlikowski W, Yates J, Okamura K and Fujimoto M (1995) Shaping electronic communication: the metastructuring of technology in the context of use. Organization Science 6 (4), 423–444.
Orlikowski WJ and Gash D (1994) Technology frames: making sense of information technology in organizations. ACM Transactions on Information Systems 12, 174–207.
Patokorpi E and Ahvenainen M (2009) Developing an abductive-based method for future research. Futures 41 (3), 126–139.
Pawlowski SD, Kaganer EA and Wiley-Patton S (2006) Building legitimation for IT innovations: organizing visions and discursive strategies of legitimacy. Academy of Management Best Conference Paper 2006 OCIS.
Pfeffer J (1981) Management as symbolic action: the creation and maintenance of organizational paradigms. In Research in Organizational Behavior (Cummins LL and Staw BM, Eds), Vol. 3, pp 1–52, JAI Press, Connecticut.
Reimers K (2003) International examples of large-scale systems – theory and practice I: implementing ERP systems in China. Communications of the AIS 11, 335–356.
Rogers EM (1983) Diffusion of Innovations. Free Press, New York.
Scheepers R, Scheepers H and Ngwenyama OK (2006) Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations. European Journal of Information Systems 15, 261–268.
Scheid-Cook TL (1992) Organisational enactments and conformity to environmental prescriptions. Human Relations 45, 537–554.
Scott WR (1987) The adolescence of institutional theory. Administrative Science Quarterly 32, 493–511.
Scott WR (1995) Institutions and organizations: toward a theoretical synthesis. In Institutional Environments and Organizations: Structural Complexity and Individualism (Scott WR and Meyer JW, Eds) Sage, Thousand Oaks, CA.
Scott WR (2001) Institutions and Organizations. Sage Publications, Thousand Oaks.
Silverman D (1997) Validity and credibility in qualitative research. In Context and Method in Qualitative Research: The Alternative Paradigm (Miller G and Dingwall R, Eds), pp 12–25, Sage, London.
Standish Group Inc (2003) CHAOS: a recipe for success. [WWW document] http://www.standishgroup.com (accessed 25 May 2009).
Stone MM and Brush CG (1996) Planning in ambiguous contexts: the dilemma of meeting needs for commitment and demands for legitimacy. Strategic Management Journal 17, 633–652.
Suchman MC (1995) Managing legitimacy: strategic and institutional approaches. Academy of Management Review 20 (3), 571–610.
Swanson EB and Ramiller NC (1997) The organizing vision in Information Systems innovation. Organization Science 8 (5), 458–474.
Venkatesh V and Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science 46 (2), 186–204.
Venkatesh V, Morris MG, Davis GB and Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quarterly 27 (3), 425–478.
Verheijden MW, Jans MP and Hildebrandt VH (2008) Web-based tailored lifestyle programs: exploration of the target group's interests and implications for practice. Health Promotion Practice 9, 82–92.
Wagner EL and Piccoli G (2007) Moving beyond user participation to achieve successful IS design. Communications of ACM 50 (12), 51–55.
Walsham G (1995) The emergence of interpretivism in IS research. Information Systems Research 6 (4), 376–394.
Wang P and Swanson EB (2007) Launching professional services automation: institutional entrepreneurship for information technology innovations. Information and Organization 17 (2), 59–88.
Worthley JA (2000) Managing Information in Healthcare: Concepts and Cases. Health Administrative Press, Chicago, IL.
Zhang L, Lee MKO, Zhang Z and Banerjee P (2002) Critical success factors of enterprise resource planning systems implementation success in China. Proceedings of the 36th Hawaii International Conference on System Sciences [WWW document] http://www.hicss.hawaii.edu/HICSS36/HICSSpapers/OSERP06.pdf (accessed 21 March 2009).
Zimmerman MA and Zeitz GJ (2002) Beyond survival: achieving new venture growth by building legitimacy. Academy of Management Review 27 (3), 414–431.
Acknowledgements
The authors would like to thank Xu Xiangyang (Changsha University, China) and Wu Kun (Central-Southern University, China) for their support and contribution to this research project. The authors are also grateful to two anonymous reviewers for their comments on earlier drafts of this article.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Flynn, D., Du, Y. A case study of the legitimation process undertaken to gain support for an information system in a Chinese university. Eur J Inf Syst 21, 212–228 (2012). https://doi.org/10.1057/ejis.2011.27
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/ejis.2011.27