{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T08:26:07Z","timestamp":1740126367319,"version":"3.37.3"},"reference-count":73,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T00:00:00Z","timestamp":1474502400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2018,1]]},"abstract":"Abstract<\/jats:title>On the basis of a four\u2010year exploratory study of a mandatory information systems implementation by an Italian, multibillion\u2010dollar dairy cooperative with 2200 members, this paper describes how key stakeholders engage in dynamic transformation processes that shape the technology, the users' practices and the organisation itself. In doing so, this study responds to calls for process\u2010oriented longitudinal explorations and suggests an alternative path of adoption in which the technology becomes the reification of a bi\u2010directional discourse about the transformation of practices for the entire network of organisations. In presenting this alternative path, this study unveils a five\u2010phase change process that both altered perceptions of the technology and its possibilities at the same time resolving tensions among the drivers and users of the mandated system. \u00a9 2016 John Wiley & Sons Ltd<\/jats:p>","DOI":"10.1111\/isj.12120","type":"journal-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T19:53:07Z","timestamp":1474573987000},"page":"6-47","source":"Crossref","is-referenced-by-count":17,"title":["My choice, your problem? Mandating IT use in large organisational networks"],"prefix":"10.1111","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4611-3513","authenticated-orcid":false,"given":"Andrea","family":"Carugati","sequence":"first","affiliation":[{"name":"Aarhus Business and Social Sciences Department of Management Aarhus University Arhus Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5249-9515","authenticated-orcid":false,"given":"Walter","family":"Fern\u00e1ndez","sequence":"additional","affiliation":[{"name":"School of Information Systems and Technology Management, UNSW Business School UNSW Australia Sydney Australia"}]},{"given":"Lapo","family":"Mola","sequence":"additional","affiliation":[{"name":"Universit\u00e9 C\u00f4te d'Azur, SKEMA CNRS, GREDEG Sophia Antipolis France"}]},{"given":"Cecilia","family":"Rossignoli","sequence":"additional","affiliation":[{"name":"Department of Business and Administration University of Verona Verona Italy"}]}],"member":"311","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.14.4.B147"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12048"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.8.3.235"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2009.15"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392767"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.10.1.1"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2010.57318391"},{"key":"e_1_2_8_9_1","doi-asserted-by":"crossref","first-page":"212","DOI":"10.17705\/1jais.00126","article-title":"Quo vadis TAM?","volume":"8","author":"Benbasat I.","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0373"},{"key":"e_1_2_8_12_1","unstructured":"Berger J. B.(2014).Mandatory e\u2010government has arrived: the silent protest from staff calls for the committed scholar\u2013resistance must never be futile!In The 25th Australasian Conference on Information Systems ACIS 2014. ACIS."},{"volume-title":"The International Co\u2010Operative Movement","year":"1997","author":"Birchall J.","key":"e_1_2_8_13_1"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.48"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.2307\/248710"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781503621749"},{"key":"e_1_2_8_17_1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222270101","article-title":"Special Section: social aspects of sociotechnical systems","volume":"27","author":"Briggs R.O.","year":"2010","journal-title":"Journal of Management Information Systems"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000438"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1040.0094"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00258.x"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0959-8022(94)90005-1"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12059"},{"key":"e_1_2_8_23_1","unstructured":"Cunha J.&Carugati A. (2013).Systems of transfiguration and the adoption of IT under surveillance. In International Conference on Information Systems 15\u201318 December 2013 Milan Italy."},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jit.2000102"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/2095101"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.6.611.12529"},{"key":"e_1_2_8_27_1","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1057\/palgrave.ejis.3000629","article-title":"Resist, comply or workaround? An examination of different facets of user engagement with information systems","volume":"15","author":"Ferneley E.H.","year":"2007","journal-title":"European Journal of Information Systems"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/0735-2751.00132"},{"key":"e_1_2_8_29_1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1504\/IJTIP.2007.013038","article-title":"Intraorganisational power and the adoption of interorganisational IT innovations: the inside story of Covisint","volume":"3","author":"Gerst M.","year":"2007","journal-title":"International Journal of Technology Intelligence and Planning"},{"volume-title":"The Constitution of Society: Outline of the Theory of Structuration","year":"1984","author":"Giddens A.","key":"e_1_2_8_30_1"},{"volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research","year":"1967","author":"Glaser B.","key":"e_1_2_8_31_1"},{"volume-title":"Theoretical Sensitivity: Advances in the Methodology of Grounded Theory","year":"1978","author":"Glaser B.G.","key":"e_1_2_8_32_1"},{"volume-title":"Doing Grounded Theory: Issues and Discussions","year":"1998","author":"Glaser B.G.","key":"e_1_2_8_33_1"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.3.285.12496"},{"key":"e_1_2_8_35_1","doi-asserted-by":"crossref","first-page":"6.151","DOI":"10.17705\/1jais.00049","article-title":"Enterprise information systems as objects and carriers of institutional forces: the new iron cage?","volume":"5","author":"Gosain S.","year":"2004","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.2307\/3069285"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593849910250556"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(02)00394-6"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2004.00164.x"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.2307\/41703498"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0740-624X(01)00089-2"},{"key":"e_1_2_8_42_1","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1057\/palgrave.jit.2000047","article-title":"DCXNET: e\u2010transformation at DaimlerChrysler","volume":"21","author":"Klein A.","year":"2006","journal-title":"Journal of Information Technology"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2013.4001"},{"key":"e_1_2_8_44_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781848608030.n7"},{"key":"e_1_2_8_45_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0427"},{"key":"e_1_2_8_46_1","doi-asserted-by":"publisher","DOI":"10.2307\/20159610"},{"key":"e_1_2_8_47_1","doi-asserted-by":"publisher","DOI":"10.1086\/226550"},{"volume-title":"Tempered Radicals: How People Use Difference to Inspire Change at Work","year":"2003","author":"Meyerson D.E.","key":"e_1_2_8_48_1"},{"key":"e_1_2_8_49_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.47"},{"key":"e_1_2_8_50_1","doi-asserted-by":"crossref","first-page":"165","DOI":"10.25300\/MISQ\/2014\/38.1.08","article-title":"Theorization and translation in information technology institutionalization: evidence from Danish home care","volume":"38","author":"Nielsen J.A.","year":"2014","journal-title":"MIS Quarterly"},{"key":"e_1_2_8_51_1","doi-asserted-by":"publisher","DOI":"10.2307\/258610"},{"key":"e_1_2_8_52_1","doi-asserted-by":"publisher","DOI":"10.2307\/249774"},{"key":"e_1_2_8_53_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.7.1.63"},{"volume-title":"Institutions and Organizations: Ideas and Interests","year":"2008","author":"Scott W.R.","key":"e_1_2_8_54_1"},{"key":"e_1_2_8_55_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840810919699"},{"key":"e_1_2_8_56_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750687"},{"key":"e_1_2_8_57_1","first-page":"57","article-title":"Competing on capabilities: the new rules of corporate strategy","volume":"70","author":"Stalk G.","year":"1992","journal-title":"Harvard Business Review"},{"key":"e_1_2_8_58_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2006.22083020"},{"key":"e_1_2_8_59_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148655"},{"key":"e_1_2_8_60_1","first-page":"99","volume-title":"Institutional Logics","author":"Thornton P.H.","year":"2008"},{"key":"e_1_2_8_61_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392383"},{"key":"e_1_2_8_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/310930.310984"},{"key":"e_1_2_8_63_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.13.5.567.7810"},{"key":"e_1_2_8_64_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2012.34"},{"key":"e_1_2_8_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2009.00328.x"},{"key":"e_1_2_8_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250131013"},{"volume-title":"Research on the management of innovation: the Minnesota studies","year":"1989","author":"Van De Ven A.H.","key":"e_1_2_8_67_1"},{"key":"e_1_2_8_68_1","doi-asserted-by":"crossref","first-page":"346","DOI":"10.17705\/1CAIS.02023","article-title":"Information systems outsourcing: linking transaction cost and institutional theories","volume":"20","author":"Vitharana P.","year":"2007","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_2_8_69_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1995.9"},{"key":"e_1_2_8_70_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0266"},{"volume-title":"Italy's Cooperatives from Marginality to Success (1951\u20132001)","year":"2006","author":"Zamagni V.","key":"e_1_2_8_71_1"},{"key":"e_1_2_8_72_1","doi-asserted-by":"publisher","DOI":"10.2307\/249085"},{"key":"e_1_2_8_73_1","doi-asserted-by":"publisher","DOI":"10.2307\/2094862"},{"key":"e_1_2_8_74_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.so.13.080187.002303"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12120","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12120","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T18:13:49Z","timestamp":1695924829000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,22]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1111\/isj.12120"],"URL":"https:\/\/doi.org\/10.1111\/isj.12120","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"type":"print","value":"1350-1917"},{"type":"electronic","value":"1365-2575"}],"subject":[],"published":{"date-parts":[[2016,9,22]]}}}