Challenges and strategies for legitimizing a temporary organization: a case study of an e-health mobile application design project
Keywords:
Stratégies de légitimation, actions symboliques, projet de conception TI, vision temporelle, application de santé mobileAbstract
The objective of this article is to analyse how the leaders of a project create s the legitimacy of a project to design a mobile e-health application in order to gain stakeholders support Through a single case study, we highlight the legitimisation challenges of an IT project analysed from the perspective of a temporary organisation. We show that this legitimacy construction process is dynamic and continuous throughout the project, bringing together pragmatic, moral and cognitive legitimisation strategies. Our analysis enriches the literature on the legitimacy of IT projects by showing the importance of the legitimacy of both the project and IT. Moreover, it complements the information systems literature on the legitimacy of IT design projects by introducing the notion of legitimacy deficit: a weakened, damaged or withdrawn legitimacy.
References
Aldrich, H.E. & Fiol, C.M. (1994), "Fools rush in? The institutional context of industry creation", Academy of management review, vol. 19, n°4, p. 645–670.
Ashaye, O.R. & Irani, Z. (2019), "The role of stakeholders in the effective use of e-government resources in public services", International Journal of Information Management, vol. 49, p. 253–270.
Ashforth, B.E. & Gibbs, B.W. (1990), "The double-edge of organizational legitimation", Organization science, vol. 1, n°2, p. 177–194.
Baghizadeh, Z., Cecez-Kecmanovic, D. & Schlagwein, D. (2020), "Review and critique of the information systems development project failure literature: An argument for exploring information systems development project distress", Journal of Information Technology, vol. 35, n°2, p. 123–142.
Banbury, A., Nancarrow, S., Dart, J., Gray, L. & Parkinson, L. (2018), "Telehealth interventions delivering home-based support group videoconferencing: systematic review", Journal of medical Internet research, vol. 20, n°2, p. 25.
Bansler, J.P. & Havn, E.C. (2004), "Improvisation in information systems development", Information systems research, p. 631–646.
Barki, H., Rivard, S. & Talbot, J. (2001), "An integrative contingency model of software project risk management", Journal of management information systems, vol. 17, n°4, p. 37–69.
Ben-Slimane, K., Diridollou, C. & Hamadache, K. (2020), "The legitimation strategies of early-stage disruptive innovation", Technological Forecasting and Social Change, vol. 158.
Berente, N. & Yoo, Y. (2012), "Institutional contradictions and loose coupling: Postimplementation of NASA’s enterprise information system", Information systems research, vol. 23, n°2, p. 376–396.
Berger, P.L. & Luckmann, T. (1991), The social construction of reality: A treatise in the sociology of knowledge, Penguin Uk.
Berrone, P., Gelabert, L. & Fosfuri, A. (2009), "The impact of symbolic and substantive actions on environmental legitimacy", Working Paper n°778, January, University of Navarra.
Blaikie, N. (2000), Designing social research, Cambridge, Polity.
Brown, A.D. (1995), "Managing understandings: politics, symbolism, niche marketing and the quest for legitimacy in IT implementation", Organization Studies, vol. 16, n°6, p. 951–969.
Brown, A.D. (1998), "Narrative, politics and legitimacy in an IT implementation", Journal of Management Studies, vol. 35, n°1, p. 35–58.
Burke, C.M. & Morley, M.J. (2016), "On temporary organizations: A review, synthesis and research agenda", Human relations, vol. 69, n°6, p. 1235–1258.
Cochoy, F. (2002), "Une petite histoire du client, ou la progressive normalisation du marché et de l’organisation", Sociologie du travail, vol. 44, p. 357–380.
Corbin, J. & Strauss, A. (2014), Basics of qualitative research: Techniques and procedures for developing grounded theory, 3nd ed., Log Angeles, CA: Sage Publications Inc.
Corley, K.G. & Gioia, D.A. (2004), "Identity Ambiguity and Change in the Wake of a Corporate Spin-Off", Administrative Science Quarterly, vol 49, n°2, p. 173–208.
Deegan, C. (2007). Organisational legitimacy as a motive for sustainability reporting, Routledge, United Kingdom, pp. 127-149.
DiMaggio, P.J. & Powell, W.W. (1983), "The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields", American sociological review, p. 147–160.
Di Maggio, P. & Powell, W. (1997), "Le néo-institutionnalisme dans l’analyse des organisations", Revue des sciences sociales du politique, vol. 10, n°40, p. 113–154.
Dounavi, K. & Tsoumani, O. (2019), "Mobile health applications in weight management: a systematic literature review", American journal of preventive medicine, vol. 56, n°6, p. 894–903.
Dowling, J. & Pfeffer, J. (1975), "Organizational legitimacy: Social values and organizational behavior", Pacific sociological review, vol. 18, n°1, p. 122–136.
Dubois, A. & Gadde, L.E. (2002), "Systematic combining: an abductive approach to case research", Journal of business research, vol.55, n°7, p. 553–560.
Dubois, A. & Gadde, L.E. (2014) "“Systematic combining”—A decade later", Journal of Business Research, vol. 67, n°6, p. 1277–1284.
Dudézert, A., Mitev, N. & Oiry, E. (2019), "Numérique et Symbolique". Systèmes d’information management, vol. 24, n°4, p. 3–8.
Elsbach, K.D. & Sutton, R.I. (1992), "Acquiring organizational legitimacy through illegitimate actions: A marriage of institutional and impression management theories", Academy of management Journal, vol. 35, n°4, p. 699–738.
Engestrӧm, Y. (2008), "Quand le centre se dérobe : la notion de knotworking et ses promesses", Sociologie du travail, vol. 50, n°3, p. 303–330.
Engwall, M. (2003), "No project is an island: linking projects to history and context". Research policy, vol. 32, n°5, p. 789–808.
Feldman, M.S. & Pentland, B.T. (2003), "Reconceptualizing organizational routines as a source of flexibility and change". Administrative science quarterly, vol. 48, n°1, p. 94–118.
Flynn, D. & Du, Y. (2012), "A case study of the legitimation process undertaken to gain support for an information system in a Chinese university", European Journal of Information Systems, vol. 21, n°3, p. 212–228.
Flynn, D. & Hussain, Z. (2004), "Seeking legitimation for an information system: a preliminary process model", Proceeding of 13th European Conference on Information Systems, Turku, Finland.
Flynn, D. & Puarungroj, W. (2006), "The dynamics of the legitimation process in an information systems project: an interpretive analysis", Proceedings of 14th European Conference on Information Systems, United States.
Flynn, D. & Puarungroj, W. (2006),"The legitimation-seeking process in information systems development, Proceedings of 14th European Conference on Information Systems, United States.
Gehman, J., Glaser, V.L., Eisenhardt, K.M., Gioia, D., Langley, A. & Corley, K.G. (2018), "Finding theory-method fit: A comparison of three qualitative approaches to theory building", Journal of Management Inquiry, vol. 27, n°3, p. 284–300.
Gioia, D.A., Corley, K.G. & Hamilton, A.L. (2013), "Seeking qualitative rigor in inductive research: Notes on the Gioia methodology", Organizational research methods, vol.16, n°1, p. 15–31.
Golant, B.D. & Sillince, J.A. (2007), "The constitution of organizational legitimacy: A narrative perspective", Organization studies, vol. 28, n° 8, p. 1149–1167.
Granja, C., Janssen, W. & Johansen, M.A. (2018), "Factors determining the success and failure of eHealth interventions: systematic review of the literature", Journal of medical Internet research, vol. 20, n°5.
Gregory, R.W., Keil, M., Muntermann, J. & Mähring, M. (2015), "Paradoxes and the nature of ambidexterity in IT transformation programs", Information Systems Research, vol. 26, n°1, p. 57–80.
Hsu, C., Lin, Y.T. & Wang, T. (2015), "A legitimacy challenge of a cross-cultural interorganizational information system", European Journal of Information Systems, vol. 24, n°3, p. 278–294.
Hussain, Z.I. & Cornelius, N. (2009) "The use of domination and legitimation in information systems implementation", Information Systems Journal, vol. 19, n°2, p. 197–224.
Kaganer, E.A., Pawlowski, S.D. & Wiley-Patton, S. (2010), "Building legitimacy for IT innovations: the case of computerized physician order entry systems" Journal of the Association for Information Systems, vol. 11, n°1, p. 2.
Keable, M., Landry, M. & Banville, C. (1998), "The legitimacy gap between IS professionals and users", Communications of the ACM, vol. 41, n°5, p. 146–156.
Keil, M. (1995), "Pulling the plug: Software project management and the problem of project escalation", MIS quarterly, Vol. 19, n°4, p. 421–447.
Klein, H.K. & Myers, M.D. (1999), "A set of principles for conducting and evaluating interpretive field studies in information systems", MIS quarterly, vol. 23, n°1, p. 67–94.
Kohli, R. & Kettinger, W.J. (2004), "Informating the clan: Controlling physicians’ costs and outcomes", Mis Quarterly, Vol. 28, n°3, p. 363–394.
Langley, A. (1999), "Strategies for theorizing from process data", Academy of Management review, Vol. 24, n°4, p. 691–710.
Legris, P. & Collerette, P. (2006), "A roadmap for IT project implementation: Integrating stakeholders and change management issues", Project Management Journal, Vol. 37, n°5, p. 64–75.
Levina, N. (2005), "Collaborating on multiparty information systems development projects: A collective reflection-in-action view", Information Systems Research, Vol. 16, n°2, p. 109–130.
Liu, L. & Yetton, P. (2009), "Sponsorship and IT vendor management of projects", Journal of Information Technology, Vol. 24, n°1, p. 46–54.
Lyng, K.M. & Pedersen, B.S. (2011), "Participatory design for computerization of clinical practice guidelines", Journal of biomedical informatics, Vol. 44, n°5, p. 909–918.
Lynn, T., Rosati, P. & Fox, G. (2018), "Legitimizing #Blockchain: An Empirical Analysis of irm-Level Social Media Messaging on Twitter. Research Papers in European Conference on Information Systems, Portsmouth, UK.
Markus, M.L., Axline, S., Petrie, D. & Tanis, S.C. (2000), "Learning from adopters’ experiences with ERP: problems encountered and success achieved", Journal of information technology, Vol. 15, n°4, p. 245–265.
Markus, M.L. & Mao, J.Y. (2004), "Participation in development and implementation-updating an old, tired concept for today’s IS contexts", Journal of the Association for Information systems, Vol. 5, n°1, p. 14.
Marsan, J., Carillo K-D., & Negoita, B. (2019), "Entrepreneurial actions and the legitimation of free/open-source software services", Journal of Information Technology, 1 –18.
Mastrogiacomo, S., Missonier, S. & Bonazzi, R. (2014), "Talk before it’s too late: Reconsidering the role of conversation in information systems project management", Journal of Management Information Systems, Vol. 31, n°1, p. 47–78.
Meissonier, R., Lapointe, L. & Houzé, E. (2015), "Légitimer l’implémentation d’un ERP : une comparaison Canada-Thailande", Journal of Decision Systems, Vol. 24, n°3, p. 318–338.
Mettler, T., Eurich, M. & Robert, W. (2014), "On the Use of Experiments in Design Science Research: A Proposition of an Evaluation Framework", Communication of the Association for Information Systems, Vol. 34.
Nilsen, E.R., Stendal, K. & Gullslett, M.K. (2020), "Implementation of eHealth Technology in Community Health Care: the complexity of stakeholder involvement", BMC health services research, Vol. 20, p. 1–13.
O’Sullivan, N. & O’Dwyer, B. (2009), "Stakeholder perspectives on a financial sector legitimation process", Accounting, Auditing & Accountability Journal. Vol. 22, n°4.
Oliver, C. (1991), "Strategic responses to institutional processes", Academy of management review, Vol. 16, n°1, 145–179.
Orlikowski, W.J. & Gash, D.C. (1994), "Technological frames: making sense of information technology in organizations", ACM Transactions on Information Systems (TOIS), Vol. 12, n°2, p. 174–207.
Pagliari, C. (2007), "Design and evaluation in eHealth: challenges and implications for an interdisciplinary field", Journal of medical Internet research, Vol. 9, n°2, p. 15.
Paré, G., Marsan, J., Jaana, M., Tamim, H. & Lukyanenko, R. (2020), "IT vendors’ legitimation strategies and market share: The case of EMR systems", Information & Management, Vol. 57.
Paré, G., Sicotte, C., Jaana, M. & Girouard, D. (2008), "Prioritizing the risk factors influencing the success of clinical information system projects", Methods of information in medicine, Vol. 47, n°3, p. 251–259.
Pawlowski, S.D., Kaganer, E.A. & Wiley-Patton, S. (2006), "Building legitimacy for it innovations: organizing visions and discursive strategies of legitimacy", Academy of Management Proceedings, Vol. 2006, p. 1–6.
Pettigrew, A.M. (1990), "Longitudinal field research on change: Theory and practice", Organization science, Vol. 1, n°3, p. 267–292.
Pfeffer, J. (1981), "Management as symbolic action: the creation and maintenance of organizational paradigm", Research in organizational behavior, Vol. 3, p. 1–52.
Ponte, D., Rossi, A. & Zamarian, M. (2009), "Cooperative design efforts for the development of complex IT-artefacts" Information Technology & People, Vol. 22, n°4, p. 317–334.
Sarrami-Foroushani, P., Travaglia, J., Debono, D. & Braithwaite, J. (2014), "Key concepts in consumer and community engagement: a scoping meta-review", BMC health services research, Vol. 14, n°1, p. 250.
Scott, W.R. (2001), Institutions and Organizations, Second Edition Sage Publications, Inc. Thousand Oaks, Calif.
Sicotte, C., Paré, G., Moreault, M.P. & Paccioni, A. (2006), "A risk assessment of two interorganizational clinical information systems", Journal of the American Medical Informatics Association, Vol. 13, n°5, p. 557–566.
Smith, A.M., Fischbacher, M. & Wilson, F.A. (2007), "New service development: from panoramas to precision", European Management Journal, Vol. 25, n°5, p. 370–383.
Srivastava, P. & Hopwood, N. (2018), "Reflection/Commentary on a Past Article :“A Practical Iterative Framework for Qualitative Data Analysis”", International Journal of Qualitative Methods, Vol. 17, n°1.
Stjerne, I.S., Sӧderlund, J. & Minbaeva, D. (2019), "Crossing times: Temporal boundary-spanning practices in interorganizational projects", International Journal of Project Management, Vol. 37, n°2, p. 347–365.
Strauss, A. & Corbin, J. (1998), Basics of qualitative research techniques. Sage publications Thousand Oaks, CA.
Suchman, M.C. (1995), "Managing legitimacy: Strategic and institutional approaches", Academy of management review, Vol. 20, n°3, p. 571–610.
Suddaby, R. & Greenwood, R. (2005), "Rhetorical strategies of legitimacy", Administrative science quarterly, Vol 50, n°1, p. 35–67.
Thévenot, L. & Boltanski, L. (1991), De la justification. Les économies de la grandeur, P. : Gallimard.
Thomas, L.D. & Ritala, P. (2019), "Ecosystem legitimacy emergence: A collective action view", Innovation ecosystems, Vol. 3.
Vaagaasar, A.L., Hernes, T. & Dille, T. (2020), "The Challenges of Implementing Temporal Shifts in Temporary Organizations: Implications of a Situated Temporal View", Project Management Journal, Vol. 51, n°4, p. 420–428.
Van Limburg, M., Van Gemert-Pijnen, J.E., Nijland, N., Ossebaard, H. C., Hendrix, R. M. & Seydel, E. R. (2011), "Why business modeling is crucial in the development of eHealth technologies", Journal of medical Internet research, Vol. 13, n°4.
Wang, P. & Swanson, E.B. (2007), "Launching professional services automation: Institutional entrepreneurship for information technology innovations", Information and Organization, Vol. 17, n°2, p. 59–88.
Wang, P. & Swanson, E.B. (2008), "Customer relationship management as advertised", Information Technology & People, Vol. 21., n°4.
Wessel, L., Baiyere, A., Ologeanu-Taddei, R., Cha, J. & Jensen, T. (2020), "Unpacking the difference between digital transformation and IT-enabled organizational transformation", Journal of Association of Information Systems, Vol. 22, n°1, Art. 6.
Xia, W. & Lee, G. (2005), "Complexity of information systems development projects: conceptualization and measurement development", Journal of management information systems, Vol. 22, n°1, p. 45–83.
Yin, R.K. (2017), Case study research and applications: Design and methods. Sage publications.
Published
How to Cite
Issue
Section
License
The author bears the responsibility for checking whether material submitted is subject to copyright or ownership rights (e.g. figures, tables, photographs, illustrations, trade literature and data). The author will need to obtain permission to reproduce any such items, and include these permissions with their final submission.
It is our policy to ask all contributors to transfer for free the copyright in their contribution to the journal owner. There are two broad reasons for this:
- ownership of copyright by the journal owner facilitates international protection against infringement of copyright, libel or plagiarism;
- it also ensures that requests by third parties to reprint or reproduce a contribution, or part of it, in either print or electronic form, are handled efficiently in accordance with our general policy which encourages dissemination of knowledge within the framework of copyright.
In conformity with the French law, the author keeps the 'moral rights' related to the article:
- The 'authorship right': It is the author's right to have his name associated with each publication and exploitation of the article.
- The 'integrity right': It can be claimed by the author if he finds that during an exploitation, his work has been distorted (cutting, reassembly...).