7
Views
28
CrossRef citations to date
0
Altmetric
Special Section: Strategic and Competitive Information Systems

Diagnosing the Human Threats to Information Technology Implementation: A Missing Factor in Systems Analysis Illustrated in a Case Study

Pages 55-73 | Published online: 15 Dec 2015

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (8)

Joachim Jean-Jules & Ricardo Vicente. (2021) Rethinking the implementation of enterprise risk management (ERM) as a socio-technical challenge. Journal of Risk Research 24:2, pages 247-266.
Read now
LINA ZHOU, YONGMEI SHI, DONGSONG ZHANG & ANDREW SEARS. (2006) Discovering Cues to Error Detection in Speech Recognition Output: A User-Centered Approach. Journal of Management Information Systems 22:4, pages 237-270.
Read now
Eric K. Clemons & Il-Horn Hann. (1999) Rosenbluth International: Strategic Transformation of a Successful Enterprise. Journal of Management Information Systems 16:2, pages 9-27.
Read now
K.D. Schenk, Nicholas P. Vitalari & K. Shannon Davis. (1998) Differences between Novice and Expert Systems Analysts: What Do We Know and What Do We Do?. Journal of Management Information Systems 15:1, pages 9-50.
Read now
Eric K. Clemons, Matt E. Thatcher & Michael C. Row. (1995) Identifying Sources of Reengineering Failures: A Study of the Behavioral Factors Contributing to Reengineering Risks. Journal of Management Information Systems 12:2, pages 9-36.
Read now
Harold G. Levine & Don Rossmoore. (1994) Politics and the Function of Power in a Case Study of IT Implementation. Journal of Management Information Systems 11:3, pages 115-133.
Read now
Jeffrey L. Sampler & James E. Short. (1994) An Examination of Information Technology’s Impact on the Value of Information and Expertise: Implications for Organizational Change. Journal of Management Information Systems 11:2, pages 59-73.
Read now
Eric K. Clemons & Bruce W. Weber. (1994) Segmentation, Differentiation, and Flexible Pricing: Experiences with Information Technology and Segment-Tailored Strategies. Journal of Management Information Systems 11:2, pages 9-36.
Read now

Articles from other publishers (20)

Christian Hadi, Juneman Abraham, Harjanto Prabowo & Harco Leslie Hendric Spits Warnars. (2022) Evaluation of IT Human Resources Management: A Case Study of Banking Industry in Indonesia. Evaluation of IT Human Resources Management: A Case Study of Banking Industry in Indonesia.
Jong Uk Kim & Rajiv Kishore. (2018) Do we Fully Understand Information Systems Failure? An Exploratory Study of the Cognitive Schema of IS Professionals. Information Systems Frontiers 21:6, pages 1385-1419.
Crossref
Niels Krijnse Locker, Janita F.J. Vos & Albert Boonstra. (2016) Understanding National Culture Effects on User Behavior in Integrative IS Implementations. Procedia Computer Science 100, pages 289-297.
Crossref
Bendik Bygstad & Bjørn Erik Munkvold. 2016. Enacting Research Methods in Information Systems: Volume 2. Enacting Research Methods in Information Systems: Volume 2 84 115 .
Henry A. Hornstein. (2015) The integration of project management and organizational change management is now a necessity. International Journal of Project Management 33:2, pages 291-298.
Crossref
Bendik BygstadBjørn Erik Munkvold. (2011) Exploring the Role of Informants in Interpretive Case Study Research in IS. Journal of Information Technology 26:1, pages 32-45.
Crossref
Richard A. Huff & Victor R. Prybutok. (2008) Information Systems Project Management Decision Making: The Influence of Experience and Risk Propensity. Project Management Journal 39:2, pages 34-47.
Crossref
Ravi Narayanaswamy & Varun Grover. 2007. Information Systems Action Research. Information Systems Action Research 327 353 .
Ghi Paul Im & Richard L. Baskerville. (2005) A longitudinal study of information system threat categories. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36:4, pages 68-79.
Crossref
John Tillquist. (2002) Rules of the game: constructing norms of influence, subordination and constraint in IT planning. Information and Organization 12:1, pages 39-70.
Crossref
F. Greg BurtonRobert A. LeitchBrad M. Tuttle. (2001) A User's Willingness to Adopt a New Information System: The Influence of the Decision-Making Improvements and Performance-Monitoring Dimensions of the System. Journal of Information Systems 15:2, pages 61-79.
Crossref
P.J.-H. Hu, P.Y.K. Chau, Y.K. Chan & J.C.K. Kwok. (2001) Investigating technology implementation in a neurosurgical teleconsultation program: a case study in Hong Kong. Investigating technology implementation in a neurosurgical teleconsultation program: a case study in Hong Kong.
Li D. Xu. (2000) The contribution of systems science to information systems research. Systems Research and Behavioral Science 17:2, pages 105-116.
Crossref
Petter Gottschalk. (1999) Implementation predictors of strategic information systems plans. Information & Management 36:2, pages 77-91.
Crossref
Francis Lau. (1999) Toward a framework for action research in information systems studies. Information Technology & People 12:2, pages 148-176.
Crossref
Michael G. Morris, Cheri Speier & Jeffrey A. Hoffer. (2007) An Examination of Procedural and Object‐oriented Systems Analysis Methods: Does Prior Experience Help or Hinder Performance?*. Decision Sciences 30:1, pages 107-136.
Crossref
P. Gottschalk. (1999) Implementation predictors of formal information technology strategy. Implementation predictors of formal information technology strategy.
F. Lau. 1997. Information Systems and Qualitative Research. Information Systems and Qualitative Research 31 68 .
E.K. Clemons, M.C. Row & M.E. Thatcher. (1995) An integrative framework for identifying and managing risks associated with large scale reengineering efforts. An integrative framework for identifying and managing risks associated with large scale reengineering efforts.
Levine & Rossmoore. (1994) Understanding the political threats to IT implementation: a case study. Understanding the political threats to IT implementation: a case study.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.