Abstract
The adoption of enterprise-wide information and communication technologies (ICTs) has become a growing trend in a wide range of industries. Resistance has been identified as one of the most common reasons for unsuccessful implementations. Assuming technologies as fixed objects, many existing theories tend to reduce resistance to psychological mechanisms or structural misalignment. The purpose of this study is to retheorize resistance to ICTs by integrating a social constructionist perspective of technology and a framework of organizational tensions. By employing qualitative methods, a case study examined the adoption, implementation and use of an enterprise-wide software system in a technology service organization. The in-depth case analysis revealed a tension-centered process model, which shows that resistance to ICTs is constituted in a dynamic, reflexive interplay between the ongoing construction of ICTs and organizational tensions. In this process, an ICT adoption brings into play various organizational tensions, which then shape the interpretations of the ICT in oppositional terms, and reactions to these tensions and oppositional interpretations result in various forms of resistance behaviors. This tension-centered process model offers a useful alternative to existing research on resistance to ICTs in the workplace.
This paper uses data collected for the author's dissertation directed by Stanley Deetz. A previous version of the paper was presented at the annual meeting of the Academy of Management in Philadelphia in August 2007.
This paper uses data collected for the author's dissertation directed by Stanley Deetz. A previous version of the paper was presented at the annual meeting of the Academy of Management in Philadelphia in August 2007.
Acknowledgements
The author wants to thank Stanley Deetz, Alan Sillars, and three anonymous reviewers for their invaluable comments on the manuscript.
Notes
This paper uses data collected for the author's dissertation directed by Stanley Deetz. A previous version of the paper was presented at the annual meeting of the Academy of Management in Philadelphia in August 2007.
1. Pseudonyms were used for the organization, participants, and the ICT to protect confidentiality and proprietary information.