{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T23:51:53Z","timestamp":1770508313387,"version":"3.49.0"},"reference-count":28,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2009,5,22]],"date-time":"2009-05-22T00:00:00Z","timestamp":1242950400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5,22]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to understand the nature of the difficulties experienced during enterprise system (ES) adoption. More specifically, this paper aims to investigate interrelations between these difficulties and therefore identify the source difficulties that cause other problems.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The research methodology is based on grounded theory approach and draws from the experience of a few dozen ES adopters. Interviews with ES practitioners are conducted and open coding procedure is applied during the process of data gathering. Next, axial coding is used to verify problem categories and subcategories. Finally, causal mapping analysis is performed in order to reveal interrelations among difficulties and elicit source problems.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results suggest causal relationship among various problem categories and reveal seven source difficulties in ES implementation: knowledge of employees holding various positions in the adopter organisations' hierarchy, changes in the enterprise occurring during ES adoption, finance, enterprise structure, information technology (IT) infrastructure, data import and legacy systems, and training schedule.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The need for further research in order to incorporate multiple stakeholder view, project phase, and success measure.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The results may help practitioners in reaching the problems' source and thus facilitate overcoming the actual problems rather than ineffectively struggling with their symptoms. As a result, practitioners may better anticipate possible problems and assess potential threats to their projects.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This study gives insight into the actual problems experienced by ES adopters. It also identifies the real problems encountered during ES implementation as well as the other problems that occur as a result of these source difficulties.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635570910957614","type":"journal-article","created":{"date-parts":[[2009,5,9]],"date-time":"2009-05-09T07:03:39Z","timestamp":1241852619000},"page":"610-627","source":"Crossref","is-referenced-by-count":28,"title":["What are real problems in enterprise system adoption?"],"prefix":"10.1108","volume":"109","author":[{"given":"Piotr","family":"Soja","sequence":"first","affiliation":[]},{"given":"Gra\u017cyna","family":"Paliwoda\u2010P\u0119kosz","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020420350232800_b1","unstructured":"Bryson, J.M., Ackermann, F., Eden, C. and Finn, Ch.B. (2004), Visible Thinking. Unlocking Causal Mapping for Practical Business Results, Wiley, San Francisco, CA."},{"key":"key2022020420350232800_b21","unstructured":"(The) Commission of the European Community (1996), \u201c(96\/280\/EC) Commission recommendation of 3 April 1996 concerning the definition of small and medium\u2010sized enterprises\u201d, Official Journal, No. L 107 of 30 April 1996, pp. 4\u20109."},{"key":"key2022020420350232800_b2","doi-asserted-by":"crossref","unstructured":"Corbin, J. and Strauss, A. (1990), \u201cGrounded theory research procedures, canons, and evaluative criteria\u201d, Qualitative Sociology, Vol. 13 No. 1, pp. 3\u201021.","DOI":"10.1007\/BF00988593"},{"key":"key2022020420350232800_b3","doi-asserted-by":"crossref","unstructured":"Du, S., Keil, M., Mathiassen, L., Shen, Y. and Tiwana, A. (2007), \u201cAttention\u2010shaping tools, expertise, and perceived control in IT project risk assessment\u201d, Decision Support Systems, Vol. 43, pp. 269\u201083.","DOI":"10.1016\/j.dss.2006.10.002"},{"key":"key2022020420350232800_b4","doi-asserted-by":"crossref","unstructured":"Finney, S. and Corbett, M. (2007), \u201cERP implementation: a compilation and analysis of critical success factors\u201d, Business Process Management Journal, Vol. 13 No. 3, pp. 329\u201047.","DOI":"10.1108\/14637150710752272"},{"key":"key2022020420350232800_b5","doi-asserted-by":"crossref","unstructured":"Glaser, B. and Strauss, A.L. (1967), Discovery of Grounded Theory: Strategies for Qualitative Research, Aldine, Chicago, IL.","DOI":"10.1097\/00006199-196807000-00014"},{"key":"key2022020420350232800_b6","unstructured":"Hughes, J. and Jones, S. (2002), \u201cReflections on the use of grounded theory in interpretive information systems research\u201d, Electronic Journal of Information Systems Evaluation, Vol. 6 No. 1, available at: www.ejise.com\/volume\u20106\/issue1\u2010art2.htm (accessed 7 July 2008)."},{"key":"key2022020420350232800_b7","doi-asserted-by":"crossref","unstructured":"Keil, M., Depledge, G. and Rai, A. (2007), \u201cEscalation: the role of problem recognition and cognitive bias\u201d, Decision Sciences, Vol. 38 No. 3, pp. 391\u2010421.","DOI":"10.1111\/j.1540-5915.2007.00164.x"},{"key":"key2022020420350232800_b8","doi-asserted-by":"crossref","unstructured":"Keil, M., Rai, A. and Mann, J. (2000), \u201cWhy software projects escalate: an empirical analysis and test of four theoretical models\u201d, MIS Quarterly, Vol. 24 No. 4, pp. 631\u201064.","DOI":"10.2307\/3250950"},{"key":"key2022020420350232800_b9","doi-asserted-by":"crossref","unstructured":"Kim, Y., Lee, Z. and Gosain, S. (2005), \u201cImpediments to successful ERP implementation process\u201d, Business Process Management Journal, Vol. 11 No. 2, pp. 158\u201070.","DOI":"10.1108\/14637150510591156"},{"key":"key2022020420350232800_b10","doi-asserted-by":"crossref","unstructured":"Kremers, M. and van Dissel, H. (2000), \u201cERP system migrations\u201d, Communications of the ACM, Vol. 43 No. 4, pp. 53\u20106.","DOI":"10.1145\/332051.332072"},{"key":"key2022020420350232800_b11","doi-asserted-by":"crossref","unstructured":"Law, C.C.H. and Ngai, E.W.T. (2007), \u201cAn investigation of the relationships between organizational factors, business process improvement, and ERP success\u201d, Benchmarking: An International Journal, Vol. 44 No. 3, pp. 387\u2010406.","DOI":"10.1108\/14635770710753158"},{"key":"key2022020420350232800_b13","unstructured":"Markus, M.L. and Tanis, C. (2000), \u201cThe enterprise system experience \u2013 from adoption to success\u201d, in Zmud, R.W. (Ed.), Framing the Domains of IT Management: Projecting the Future, Pinnaflex Educational Resources, Cincinnati, OH, pp. 173\u2010207."},{"key":"key2022020420350232800_b12","doi-asserted-by":"crossref","unstructured":"Markus, M.L., Axline, S., Petrie, D. and Tanis, C. (2000), \u201cLearning from adopters' experiences with ERP: problems encountered and success achieved\u201d, Journal of Information Technology, Vol. 15 No. 4, pp. 245\u201066.","DOI":"10.1177\/026839620001500402"},{"key":"key2022020420350232800_b14","doi-asserted-by":"crossref","unstructured":"Nah, F., Tan, X. and Teh, S.H. (2004), \u201cAn empirical investigation on end\u2010users' acceptance of enterprise systems\u201d, Information Resources Management Journal, Vol. 17 No. 3, pp. 32\u201053.","DOI":"10.4018\/irmj.2004070103"},{"key":"key2022020420350232800_b15","unstructured":"O'Leary, D. (2000), Enterprise Resource Planning Systems, Cambridge University Press, Cambridge."},{"key":"key2022020420350232800_b16","doi-asserted-by":"crossref","unstructured":"Oliver, D., Whymark, G. and Romm, C. (2005), \u201cResearching ERP adoption: an internet\u2010based grounded theory approach\u201d, Online Information Review, Vol. 29 No. 6, pp. 585\u2010603.","DOI":"10.1108\/14684520510638052"},{"key":"key2022020420350232800_b17","doi-asserted-by":"crossref","unstructured":"Orlikowski, W.J. (1993), \u201cCASE tools as organisational change: investigating incremental and radical changes in systems development\u201d, Management Information Systems Quarterly, Vol. 17 No. 3, pp. 309\u201040.","DOI":"10.2307\/249774"},{"key":"key2022020420350232800_b18","doi-asserted-by":"crossref","unstructured":"Ross, J.W. and Vitale, M.R. (2000), \u201cThe ERP revolution: surviving vs thriving\u201d, Information Systems Frontiers, Vol. 2 No. 2, pp. 233\u201041.","DOI":"10.1023\/A:1026500224101"},{"key":"key2022020420350232800_b19","doi-asserted-by":"crossref","unstructured":"Soja, P. (2008), \u201cDifficulties in enterprise system implementation in emerging economies: insights from an exploratory field study in Poland\u201d, Information Technology for Development. Special issue on Informatiosn Technology Investments in Emerging Economies, Vol. 14 No. 1, pp. 31\u201051.","DOI":"10.1002\/itdj.20086"},{"key":"key2022020420350232800_b20","unstructured":"Somers, T. and Nelson, K. (2001), \u201cThe impact of critical success factors across the stages of enterprise resource planning implementations\u201d, Proceedings of the 34th Hawaii International Conference on System Sciences, 4\u20107 January, Maui, HI, Vol. 8, p. 8016."},{"key":"key2022020420350232800_b22","unstructured":"Themistocleous, M., Irani, Z., O'Keefe, R.M. and Paul, R. (2001), \u201cERP problems and application integration issues: an empirical survey\u201d, Proceedings of the 34th Hawaii International Conference on System Sciences, 4\u20107 January, Maui, HI, Vol. 9, p. 9045."},{"key":"key2022020420350232800_b23","doi-asserted-by":"crossref","unstructured":"Tiwana, A. and Keil, M. (2004), \u201cThe one\u2010minute risk assessment tool\u201d, Communications of the ACM, Vol. 47 No. 11, pp. 73\u20107.","DOI":"10.1145\/1029496.1029497"},{"key":"key2022020420350232800_b24","doi-asserted-by":"crossref","unstructured":"Volkoff, O., Strong, D.M. and Elmes, M.B. (2005), \u201cUnderstanding enterprise systems\u2010enabled integration\u201d, European Journal of Information Systems, Vol. 14 No. 2, pp. 110\u201020.","DOI":"10.1057\/palgrave.ejis.3000528"},{"key":"key2022020420350232800_b25","doi-asserted-by":"crossref","unstructured":"Wallace, L. and Keil, M. (2004), \u201cSoftware project risks and their effect on outcomes\u201d, Communications of the ACM, Vol. 47 No. 4, pp. 68\u201073.","DOI":"10.1145\/975817.975819"},{"key":"key2022020420350232800_b26","unstructured":"Walpole, R.E., Myers, R.H. and Myers, S.L. (1998), Probability and Statistics for Engineers and Scientists, 6th ed., Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022020420350232800_b27","unstructured":"Wiegers, K. (1998), \u201cKnow your enemy: software risk management\u201d, Software Development, Vol. 6 No. 10, pp. 38\u201042."},{"key":"key2022020420350232800_b28","doi-asserted-by":"crossref","unstructured":"Wright, S. and Wright, A.M. (2002), \u201cInformation system assurance for enterprise resource planning systems: unique risk considerations\u201d, Journal of Information Systems, Vol. 16, Supplement, pp. 99\u2010113.","DOI":"10.2308\/jis.2002.16.s-1.99"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570910957614","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570910957614\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570910957614\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:12Z","timestamp":1753400292000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/109\/5\/610-627\/179247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,22]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,5,22]]}},"alternative-id":["10.1108\/02635570910957614"],"URL":"https:\/\/doi.org\/10.1108\/02635570910957614","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2009,5,22]]}}}