Match!

Intensifying to Cease: Unpacking the Process of Information Systems Discontinuance

Published on Mar 1, 2019in Management Information Systems Quarterly4.373
· DOI :10.25300/MISQ/2019/13717
Mohammad Hosein Rezazade Mehrizi3
Estimated H-index: 3
,
Mohammad Hosein Rezazade Mehrizi1
Estimated H-index: 1
+ 0 AuthorsMilad Zafar Nezhad4
Estimated H-index: 4
(WSU: Wayne State University)
Abstract
Legacy information systems consume a large portion of information technology budgets and often impose serious limitations on organizations’ flexibility and innovation. Despite the extensive literature on how organizations adopt and use new IS, we know little about how organizations discontinue their legacy IS. Current studies suggest some actions and events to cease mechanisms such as legitimization, learning, and routinization that give continuity to the systems. However, we do not know when these actions emerge in the discontinuance process to gradually reduce the organizational commitments to legacy IS, nor do we know how ceasing one mechanism can facilitate or, conversely, hamper ceasing other mechanisms, especially when these systems involve interdependences between various components. Based on a process analysis of four software companies, we show that, contrary to the current literature, IS discontinuance is not a matter of merely ceasing each and every mechanism of an established IS; rather, it often requires that some mechanisms be temporarily intensified to prevent premature discontinuance and enable subsequent cessation of other mechanisms. Through cross-case analysis, we articulate a set of causal mechanisms that expands our understanding of how the discontinuance process can be differently shaped by organizational commitments and interdependences involved in legacy IS.
  • References (0)
  • Citations (4)
📖 Papers frequently viewed together
2019
1997
1 Author (Andrew Vesey)
1 Citations
12 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
References0
Newest
Cited By4
Newest
#1Daniel Fürstenau (FU: Free University of Berlin)H-Index: 4
#2Hannes Rothe (FU: Free University of Berlin)H-Index: 2
Last. Matthias Sandner (FU: Free University of Berlin)H-Index: 3
view all 3 authors...
With the advent of end-user and cloud computing, business users can implement information systems for work practices on their own – either from scratch or as extensions to existing systems. The resulting information systems, however, often remain hidden from managers and official IT units, and are therefore called “shadow IT systems”. When a shadow IT system is identified, the organization has to decide on the future of this system. The study uses a configurational perspective to explain outcome...
Source
#1Wael Soliman (University of Jyväskylä)H-Index: 4
#1Wael Soliman (University of Jyväskylä)H-Index: 12
Last. Tapani Rinta-Kahila (UQ: University of Queensland)H-Index: 3
view all 2 authors...
Abstract Interest in studying information systems discontinuance has been increasing lately, yet there is no consensus on what it means. To improve the situation, we conduct a comprehensive review of current literature on IS discontinuance and identify 55 studies published during 1991–2017 that specifically focus on the topic. Our conceptual analysis disentangles the process, content, and context of the phenomenon, revealing that over the course of a typical IS lifecycle, IS discontinuance may m...
4 CitationsSource
#1Martin Wiener (TUD: Dresden University of Technology)H-Index: 11
#2W. Alec Cram (UW: University of Waterloo)
view all 3 authors...
The rise of the gig economy has become a global phenomenon that encompasses various industries. Instead of hiring full-time employees, gig economy companies ‘outsource’ work via online platforms to freelance workers who are paid for completing a given task (‘gig’). While gig workers are often portrayed as independent contractors, gig firms leverage advanced digital technologies and smart algorithms to exercise control over their freelance workforce, referred to as technology-mediated control (TM...
Source
#1Cheng-Kui Huang (CCU: National Chung Cheng University)
#2Shin-Horng Chen (STUST: Southern Taiwan University of Science and Technology)
Last. Hsin-Ying Huang (CCU: National Chung Cheng University)
view all 4 authors...
Abstract Numerous mobile apps have been developed for making our lives more convenient and improving our quality of life. Health apps are among them. These types of apps are designed to help users for recording their health-related behaviors and to give advice about improving users’ physical conditions. However, users frequently do not continue to use these health apps. As a result, the companies of health apps have paid the development cost but cannot get back the benefit from the apps they lau...
Source