Skip to main content
Log in

A case study of the legitimation process undertaken to gain support for an information system in a Chinese university

  • Research Article
  • Published:
European Journal of Information Systems

Abstract

This research examines the legitimation process that was undertaken to gain stakeholder support for the development of a smartcard system for student services at a local university in China. We employed a theoretical framework consisting of Suchman's typology of legitimacy and the Legitimation Activity Model (LAM) for sense-making of the process. We obtained insights into how legitimation of the system was gained, maintained and repaired through the project team's strategic actions. We conceptualized the rotation of legitimation gaining, maintaining and repairing activities in the project and make suggestions for improving the LAM. We emphasize that monitoring and evaluating legitimation is a dynamic, continuous process, involving the concept of legitimation status, and linking the planned actions of legitimation- gaining and responsive actions for legitimation maintaining and repairing. We suggest that to achieve legitimation for information systems, managers should plan strategies to construct and present an appropriate image of the system, in which stakeholders perceive that it meets their needs, and, in addition, closely monitor the status of legitimation granted over a continuous period. This is because legitimation is a ‘fragile flower’ that may wilt if not attended to adequately.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1

Similar content being viewed by others

References

  • Ajzen I (1985) From intentions to actions: a theory of planned behavior. In Action Control: From Cognition to Behavior (Kuhl J and Beckmann J, Eds), pp 11–39, Springer Verlag, New York.

    Chapter  Google Scholar 

  • Aldrich HE and Fiol CM (1994) Fools rush in? The institutional context of industry creation. Academy of Management Review 19 (4), 645–670.

    Google Scholar 

  • Ash JS, Anderson JG, Gorman PN, Zielstorff RD, Norcross N and Petit J (2000) Managing change: an analysis of a hypothetical case. Journal of the American Medical Informatics Association 7, 125–134.

    Article  Google Scholar 

  • Ashforth BE and Gibbs BW (1990) The double-edge of organizational legitimation. Organization Science 1 (2): 177–194.

    Article  Google Scholar 

  • Avison D and Young T (2007) Time to rethink health care and ICT. Communications of the ACM 50 (6), 69–74.

    Article  Google Scholar 

  • Bansler JP and Havn EC (2004) Improvisation in information systems development. In Information Systems Research, Relevant Theory and Informed Practice (Kaplan B, Truex III D, Wastell D, Wood-Harper T and DeGross JI, Eds), pp 631–648, Kluwer, London.

    Google Scholar 

  • Banville C (1991) A study of legitimacy as a social dimension of organizational information systems. In Information Systems Research: Contemporary Approaches and Emergent Traditions (Nissen HE, Klein HK and Hirschheim R, Eds), pp 107–129, North-Holland, Amsterdam.

    Google Scholar 

  • Barki H and Hartwick J (1994) Measuring user participation, user involvement, and user attitude. MIS Quarterly 18 (1), 59–82.

    Article  Google Scholar 

  • Berger PL and Luckmann T (1966) The Social Construction of Reality: A Treatise in the Sociology of Knowledge. Penguin Books, London.

    Google Scholar 

  • Bhattacherjee A and Hikmet N (2007) Physicians’ resistance toward healthcare information technology: a theoretical model and empirical test. European Journal of Information System 16, 725–737.

    Article  Google Scholar 

  • Blaikie N (2000) Designing Social Research. Polity Press, Cambridge.

    Google Scholar 

  • Boudreau M and Robey D (2005) Enacting integrated information technology: a human agency perspective. Organisation Science 16 (1), 3–18.

    Article  Google Scholar 

  • Brown AD (1995) Managing understandings: politics, symbolism, niche marketing and the quest for legitimacy in IT implementation. Organization Studies 16 (6), 951–969.

    Article  Google Scholar 

  • Brown AD (1998) Narrative, politics and legitimacy in an IT implementation. Journal of Management Studies 35 (1), 35–58.

    Article  Google Scholar 

  • Brown SA, Massey AP, Montoya-Weiss MM and Burkman JR (2002) Do I really have to? User acceptance of mandated technology. European Journal of information Systems 11, 283–295.

    Article  Google Scholar 

  • Buchanan DA and Bryman A (2009) The SAGE Handbook of Organizational Research Methods. Sage, California.

    Google Scholar 

  • Chakravarthy BS (1997) Managing corporate transformation: two contrasting leadership styles. In Strategy, Structure and Styles (Thomas H, O’Neal D and Ghertman M, Eds), pp 69–84, Wiley, Chichester.

    Google Scholar 

  • Chakravarthy BS and Gargiulo M (1998) Maintaining leadership legitimacy in the transition to new organizational forms. Journal of Management Studies 35 (4), 437–456.

    Article  Google Scholar 

  • Chiasson MW and Davidson E (2004) Pushing the contextual envelope: developing and diffusing IS theory for health information systems research. Information and Organization 14 (3), 155–188.

    Article  Google Scholar 

  • Chin WW and Lee MKO (2000) A proposed model and measurement instrument for the formation of IS satisfaction: the case of end-user computing satisfaction. In Proceedings of the 21st International Conference on Information Systems (Orlikowski WJ, Ang S, Weill P, Krcmar HC and Degross JI, Eds), pp 553–563, Association for Information Systems, Atlanta, GA.

    Google Scholar 

  • Davidson E (2002) Technology frames and framing: a socio-cognitive investigation of requirements determination. MIS Quarterly 26 (4), 329–358.

    Article  Google Scholar 

  • Davidson E (2006) A technological frames perspective on information technology and organizational change. Journal of Applied Behavioral Science 42 (1), 23–39.

    Article  Google Scholar 

  • Davis F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 (3), 318–339.

    Article  Google Scholar 

  • Davis GB (1982) Claim: user-developed systems can be hazardous to your organization. Proceedings of 17th Annual Hawaii Conference on System Sciences, Honolulu, Hawaii.

    Google Scholar 

  • Davis F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 (3), 318–339.

    Article  Google Scholar 

  • Della Fave LR (1991) Ritual and the legitimation of inequality. Sociological Perspectives 34 (1), 21–38.

    Article  Google Scholar 

  • Delone WH and Mclean ER (2003) The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems 19 (4), 9–30.

    Google Scholar 

  • Dong L, Neufeld D and Higgins C (2009) Top management support of enterprise system applications. Journal of Information Technology 24, 55–80.

    Article  Google Scholar 

  • Eason K and Harker S (1988) The use of prototyping and simulation in the development of large-scale applications. The Computer Journal 31 (5), 420–425.

    Article  Google Scholar 

  • Eisenhardt KM (1989) Building theories from case study research. Academy of Management Review 14 (4), 532–550.

    Google Scholar 

  • Elsbach KD (1994) Managing organizational legitimacy in the California cattle industry: the construction and effectiveness of verbal accounts. Administrative Science Quarterly 39 (1), 57–88.

    Article  Google Scholar 

  • Elsbach KD and Sutton RI (1992) Acquiring organizational legitimacy through illegitimate actions: a marriage of institutional and impression management theories. Academy of Management Journal 35 (4), 699–738.

    Article  Google Scholar 

  • European Commission (2009) eHealth in action: good practices in European countries. Information society and media, European Commission. [WWW document] http://ec.europa.eu/information_society/activities/health/docs/studies/2009good_eHealth-report.pdf (accessed 21 March 2009).

  • Ferneley EH and Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. European Journal of Information Systems 15 (4), 345–356.

    Article  Google Scholar 

  • Fishbein M and Ajzen I (1980) Understanding Attitudes and Predicting Social Behavior. Prentice-Hall, Englewood Cliffs, NJ.

    Google Scholar 

  • Flynn D and Puarungroj W (2006) The dynamics of the legitimation process in an information systems project: an interpretive analysis. In Proceedings of 14th European Conference on Information Systems Goteborg, Sweden.

  • Flynn DJ and Hussain Z (2004) Seeking legitimation for an information system: a preliminary legitimation activity model. Working Paper, School of Informatics, University of Manchester.

  • Gefen D and Riding CM (2003) IT acceptance: managing user-IT group boundaries. The DATA BASE for Advances in Information Systems 34 (3), 25–40.

    Article  Google Scholar 

  • Giddens A (1984) The Constitution of Society: Outline of the Theory of Structuration. Polity Press, Cambridge, UK.

    Google Scholar 

  • Glaser BG and Strauss AL (1967) The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine, Chicago.

    Google Scholar 

  • Glick W, Huber G, Miller C, Doty D and Sutcliffe K (1990) Studying changes in organizational design and effectiveness: retrospective event histories and periodic assessments. Organization Science (1), 293–312.

  • Goodhue DL and Thompson RL (1995) Task-technology fit and individual performance. MIS Quarterly 19 (2), 213–236.

    Article  Google Scholar 

  • Habermas J (1973) Legitimation Crisis. Beacon Press, Boston, MA.

    Google Scholar 

  • Hannan MT and Freeman J (1986) Where do organizational forms come from? Sociological Forum 1 (1), 50–72.

    Article  Google Scholar 

  • Herriott R and Firestone W (1983) Multisite qualitative policy research: optimizing description and generalizability. Educational Researcher (12), 14–19.

  • Hirschheim R and Newman M (1988) Information systems and user resistance: theory and practice. The Computer Journal 31 (5), 398–408.

    Article  Google Scholar 

  • Hunt CS and Aldrich HE (1996) Why even Rodney Danger-Held has a home page: legitimizing the world wide web as a medium for commercial endeavours. Paper presented at the annual meeting of the Academy of Management, Cincinnati, OH.

  • Hussain Z and Cornelius N (2009) The use of domination and legitimation in information systems implementation. Information Systems Journal 19, 197–224.

    Article  Google Scholar 

  • Hussain Z, Taylor A and Flynn D (2004) A case study of the process of achieving legitimation in information system development. Journal of Information Science 30 (5), 408–417.

    Article  Google Scholar 

  • Jasperson J, Butler BS, Carte TA, Cross HJ, Saunders CS and Zheng W (2002) Review: power and information technology research: a metatriangulation review. MIS Quarterly 26, 397–459.

    Article  Google Scholar 

  • Jensen TB and Aanestad M (2007) Hospitality and hostility in hospitals: a case study of an EPR adoption among surgeons. European Journal of Information Systems 16, 672–680.

    Article  Google Scholar 

  • Jiang JJ, Muhanna WA and Klein G (2000) User resistance and strategies for promoting acceptance across systems types. Information & Management 37, 25–36.

    Article  Google Scholar 

  • Kaarst-Brown ML and Robey D (1999) More on myth, magic and metaphor: cultural insights into the management of information technology in organizations. Information Technology & People 12 (2), 192–217.

    Article  Google Scholar 

  • Kaganer E, Pawlowski SD and Wiley-Patton S (2010) Building legitimacy for IT innovations: the case of computerized physician order entry systems. Journal of the Association of Information Systems 11 (1), 1–33.

    Google Scholar 

  • Kaplan B (1997) Addressing organizational issues into the evaluation of medical systems. Journal of the American Medical Informatics Association 4, 94–101.

    Article  Google Scholar 

  • Keable M, Landry M and Banville C (1998) The legitimacy gap between IS professionals and users. Communications of the ACM 41 (5), 146–156.

    Article  Google Scholar 

  • Keil M (1995) Pulling the plug: software project management and the problem of project escalation. MIS Quarterly 19, 421–447.

    Article  Google Scholar 

  • Keil M and Robey D (2001) Blowing the whistle on troubled software projects. Communications of the ACM 44 (4), 87–93.

    Article  Google Scholar 

  • Klein HK and Hirschheim RA (1989) Legitimation in information systems development: a social change perspective. Office, Technology and People 5 (1), 29–46.

    Article  Google Scholar 

  • Kohli R and Kettinger WJ (2004) Informating the clan: controlling physicians’ costs and outcomes. MIS Quarterly 28 (3), 363–394.

    Google Scholar 

  • Lee AS and Baskerville RL (2003) Generalizing generalizability in information systems research. Information Systems Research 14 (3), 221–243.

    Article  Google Scholar 

  • Lewin K (1935) A Dynamic Theory of Personality. McGraw-Hill, New York.

    Google Scholar 

  • Lyytinen K and Damsgaard J (1996) What's wrong with diffusion of innovation theory? The case of a complex and networked technology. In Diffusion and Adoption of Information Technology (Kautz K and Pries-Heje J, Eds), Chapman and Hall, London.

    Google Scholar 

  • Mackay H (1995) Theorising the IT–society relationship. In Information Technology and Society: A Reader (Heap N, Thomas R, Einon G, Mason R and Mackay H, Eds), Sage/OU, London.

    Google Scholar 

  • Markus ML (1983) Power, politics, and MIS implementation. Communications of the ACM 26 (6), 430–444.

    Article  Google Scholar 

  • Markus ML (2004) Technochange management: using IT to drive organizational change. Journal of Information Technology 19 (1), 4–20.

    Article  Google Scholar 

  • Myers MD and Young LW (1997) Hidden agendas, power and managerial assumptions in information systems development: an ethnographic study. Information Technology & People 10, 224–240.

    Article  Google Scholar 

  • Nadan RK (1997) The dialectic of management control: the case of the Fiji development bank. PhD Thesis, Bristol University.

  • Oliver C (1991) Strategic responses to institutional processes. Academy of Management Review 16 (1), 145–179.

    Article  Google Scholar 

  • Orlikowski W, Yates J, Okamura K and Fujimoto M (1995) Shaping electronic communication: the metastructuring of technology in the context of use. Organization Science 6 (4), 423–444.

    Article  Google Scholar 

  • Orlikowski WJ and Gash D (1994) Technology frames: making sense of information technology in organizations. ACM Transactions on Information Systems 12, 174–207.

    Article  Google Scholar 

  • Patokorpi E and Ahvenainen M (2009) Developing an abductive-based method for future research. Futures 41 (3), 126–139.

    Article  Google Scholar 

  • Pawlowski SD, Kaganer EA and Wiley-Patton S (2006) Building legitimation for IT innovations: organizing visions and discursive strategies of legitimacy. Academy of Management Best Conference Paper 2006 OCIS.

  • Pfeffer J (1981) Management as symbolic action: the creation and maintenance of organizational paradigms. In Research in Organizational Behavior (Cummins LL and Staw BM, Eds), Vol. 3, pp 1–52, JAI Press, Connecticut.

    Google Scholar 

  • Reimers K (2003) International examples of large-scale systems – theory and practice I: implementing ERP systems in China. Communications of the AIS 11, 335–356.

    Google Scholar 

  • Rogers EM (1983) Diffusion of Innovations. Free Press, New York.

    Google Scholar 

  • Scheepers R, Scheepers H and Ngwenyama OK (2006) Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations. European Journal of Information Systems 15, 261–268.

    Article  Google Scholar 

  • Scheid-Cook TL (1992) Organisational enactments and conformity to environmental prescriptions. Human Relations 45, 537–554.

    Article  Google Scholar 

  • Scott WR (1987) The adolescence of institutional theory. Administrative Science Quarterly 32, 493–511.

    Article  Google Scholar 

  • Scott WR (1995) Institutions and organizations: toward a theoretical synthesis. In Institutional Environments and Organizations: Structural Complexity and Individualism (Scott WR and Meyer JW, Eds) Sage, Thousand Oaks, CA.

    Google Scholar 

  • Scott WR (2001) Institutions and Organizations. Sage Publications, Thousand Oaks.

    Google Scholar 

  • Silverman D (1997) Validity and credibility in qualitative research. In Context and Method in Qualitative Research: The Alternative Paradigm (Miller G and Dingwall R, Eds), pp 12–25, Sage, London.

    Google Scholar 

  • Standish Group Inc (2003) CHAOS: a recipe for success. [WWW document] http://www.standishgroup.com (accessed 25 May 2009).

  • Stone MM and Brush CG (1996) Planning in ambiguous contexts: the dilemma of meeting needs for commitment and demands for legitimacy. Strategic Management Journal 17, 633–652.

    Article  Google Scholar 

  • Suchman MC (1995) Managing legitimacy: strategic and institutional approaches. Academy of Management Review 20 (3), 571–610.

    Google Scholar 

  • Swanson EB and Ramiller NC (1997) The organizing vision in Information Systems innovation. Organization Science 8 (5), 458–474.

    Article  Google Scholar 

  • Venkatesh V and Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science 46 (2), 186–204.

    Article  Google Scholar 

  • Venkatesh V, Morris MG, Davis GB and Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quarterly 27 (3), 425–478.

    Google Scholar 

  • Verheijden MW, Jans MP and Hildebrandt VH (2008) Web-based tailored lifestyle programs: exploration of the target group's interests and implications for practice. Health Promotion Practice 9, 82–92.

    Article  Google Scholar 

  • Wagner EL and Piccoli G (2007) Moving beyond user participation to achieve successful IS design. Communications of ACM 50 (12), 51–55.

    Article  Google Scholar 

  • Walsham G (1995) The emergence of interpretivism in IS research. Information Systems Research 6 (4), 376–394.

    Article  Google Scholar 

  • Wang P and Swanson EB (2007) Launching professional services automation: institutional entrepreneurship for information technology innovations. Information and Organization 17 (2), 59–88.

    Article  Google Scholar 

  • Worthley JA (2000) Managing Information in Healthcare: Concepts and Cases. Health Administrative Press, Chicago, IL.

    Google Scholar 

  • Zhang L, Lee MKO, Zhang Z and Banerjee P (2002) Critical success factors of enterprise resource planning systems implementation success in China. Proceedings of the 36th Hawaii International Conference on System Sciences [WWW document] http://www.hicss.hawaii.edu/HICSS36/HICSSpapers/OSERP06.pdf (accessed 21 March 2009).

  • Zimmerman MA and Zeitz GJ (2002) Beyond survival: achieving new venture growth by building legitimacy. Academy of Management Review 27 (3), 414–431.

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank Xu Xiangyang (Changsha University, China) and Wu Kun (Central-Southern University, China) for their support and contribution to this research project. The authors are also grateful to two anonymous reviewers for their comments on earlier drafts of this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Donal Flynn.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Flynn, D., Du, Y. A case study of the legitimation process undertaken to gain support for an information system in a Chinese university. Eur J Inf Syst 21, 212–228 (2012). https://doi.org/10.1057/ejis.2011.27

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/ejis.2011.27

Keywords

Navigation