{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:07:50Z","timestamp":1754158070595,"version":"3.41.2"},"reference-count":32,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000,12,1]]},"abstract":"<jats:p>Assumptions about an object under study can influence research in many ways. These preconceptions color the researcher\u2019s perspective, and influence the research purpose, the research questions addressed, and the research methods used. This paper identifies and analyzes the following assumptions regarding information systems methodology (ISM) research: the positive impact of methodologies on the process and product of information system design; the irrationality of design practice; the existence of knowledge about good design practice; the ability to communicate design knowledge to practicing designers; and the ability to change the rationality of design practitioners. The impact of these assumptions on ISM research is examined for the purpose of highlighting limitations of past research and identifying more promising directions for the future.<\/jats:p>","DOI":"10.1108\/09593840010359509","type":"journal-article","created":{"date-parts":[[2004,5,12]],"date-time":"2004-05-12T09:35:47Z","timestamp":1084354547000},"page":"313-327","source":"Crossref","is-referenced-by-count":31,"title":["Exploring the assumptions underlying information systems methodologies"],"prefix":"10.1108","volume":"13","author":[{"given":"Nancy L.","family":"Russo","sequence":"first","affiliation":[]},{"given":"Erik","family":"Stolterman","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031519472808000_b1","unstructured":"Andersson, P., Karlsson, U.\u2010K. and Larsson, P. (1997), Does Educational Background Affect How Students Consider a Designers Personal Qualities?, Student report in the course Design Theory, Department of Informatics, Ume\u00e5 University, Umea\u02da."},{"key":"key2022031519472808000_b2","doi-asserted-by":"crossref","unstructured":"Avison, D.E. and Fitzgerald, G. (1991), \u201cEditorial\u201d, Journal of Information Systems, Vol. 1 No. 4, pp. 221\u20102.","DOI":"10.1111\/j.1365-2575.1991.tb00058.x"},{"key":"key2022031519472808000_b3","unstructured":"Baskerville, R., Travis, J. and Truex, D. (1992), \u201cSystems without method: the impact of new technologies on information systems development projects\u201d, in Kendall, K.E., Lyytinen, K. and DeGross, J.I. (Eds), The Impact of Computer Supported Technologies on Information Systems Development, North\u2010Holland, Amsterdam, pp. 241\u201070."},{"key":"key2022031519472808000_b4","unstructured":"Bubenko, J.A. Jr (1986), \u201cInformation system methodologies \u2013 a research view\u201d, in Olle, T.W., Sol, H.G. and Verrijn\u2010Stuart, A.A. (Eds), Information Systems Design Methodologies: Improving the Practice, North Holland, Amsterdam."},{"key":"key2022031519472808000_b5","doi-asserted-by":"crossref","unstructured":"Chatzoglou, P.D. and Macaulay, L.A. (1996), \u201cRequirements capture and IS methodologies\u201d, Information Systems Journal, April, pp. 209\u201025.","DOI":"10.1111\/j.1365-2575.1996.tb00014.x"},{"key":"key2022031519472808000_b6","unstructured":"Checkland, P. and Scholes, J. (1990), Soft Systems Methodology in Action, John Wiley & Sons, Chichester."},{"key":"key2022031519472808000_b7","doi-asserted-by":"crossref","unstructured":"Coyne, R. (1995), Designing Information Technology in the Postmodern Age, The MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/2373.001.0001"},{"key":"key2022031519472808000_b8","unstructured":"Csikszentmihalyi, M. (1990), Flow The Psychology of Optimal Experience, Harper Perennial, New York, NY."},{"key":"key2022031519472808000_b9","unstructured":"Dahlbom, B. and Mathiassen, L. (1993), Computers in Context: The Philosophy and Practice of Systems Design, NCC Blackwells, Cambridge."},{"key":"key2022031519472808000_b10","doi-asserted-by":"crossref","unstructured":"DeMarco, T. and Lister, T. (1989), \u201cSoftware development: state of the art v. state of the practice\u201d, Proceedings of the 11th International Conference on Software Engineering, pp. 271\u20105.","DOI":"10.1145\/74587.74625"},{"key":"key2022031519472808000_b11","unstructured":"Finkelstein, C. (1992), Information Engineering: Strategic Systems Development, Addison\u2010Wesley Publishing Company, Sydney."},{"key":"key2022031519472808000_b12","unstructured":"Fitzgerald, B. (1994), \u201cSystems development dilemma: whether to adopt formalised systems development methodologies or not?\u201d, in Baets, W.R.J. (Ed.), Proceedings of the Second European Conference on Information Systems, Nijenrode University Press, Nijenrode, pp. 691\u2010706."},{"key":"key2022031519472808000_b13","doi-asserted-by":"crossref","unstructured":"Fitzgerald, B. (1997), \u201cA tale of two roles: the use of systems development methodologies in practice\u201d, Proceedings of the British Computer Society\u2019s Annual Conference on Information System Methodologies, Fall.","DOI":"10.1046\/j.1365-2575.1997.d01-18.x"},{"key":"key2022031519472808000_b14","doi-asserted-by":"crossref","unstructured":"Hardy, C.J., Thompson, J.B. and Edwards, H.M. (1995), \u201cThe use, limitations and customization of structured systems development methods in the United Kingdom\u201d, Information and Software Technology, Vol. 37 No. 9, pp. 467\u201077.","DOI":"10.1016\/0950-5849(95)97291-F"},{"key":"key2022031519472808000_b15","doi-asserted-by":"crossref","unstructured":"Hirschheim, R., Klein, H.K. and Lyytinen, K. (1996), \u201cExploring the intellectual structures of information systems development: a social action theoretical analysis\u201d, Accounting, Management & Information Technology, Vol. 6 No. 1\u20102, pp. 1\u201064.","DOI":"10.1016\/0959-8022(96)00004-5"},{"key":"key2022031519472808000_b16","doi-asserted-by":"crossref","unstructured":"Introna, L. (1996), \u201cNotes on ateleological information systems development. Information\u201d, Technology & People, Vol. 9 No. 4.","DOI":"10.1108\/09593849610153412"},{"key":"key2022031519472808000_b17","unstructured":"Martin, J. (1993), Principles of Object\u2010Oriented Analysis and Design, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022031519472808000_b18","doi-asserted-by":"crossref","unstructured":"McGuire, W.J. (1973), \u201cThe yin and yang of progress in social psychology: seven koan\u201d, Journal of Personality and Social Psychology, Vol. 26 No. 3,  pp. 446\u201056.","DOI":"10.1037\/h0034345"},{"key":"key2022031519472808000_b19","doi-asserted-by":"crossref","unstructured":"Newman, M. (1989), \u201cSome fallacies in information systems development\u201d, International Journal of Information Management, Vol. 9, pp. 127\u201043.","DOI":"10.1016\/0268-4012(89)90021-2"},{"key":"key2022031519472808000_b20","doi-asserted-by":"crossref","unstructured":"Parnas, D. and Clements, P. (1986), \u2018\u2018A rational design process: how and why to fake it\u201d, IEEE Transactions on Software Engineering, February, pp. 251\u20107.","DOI":"10.1109\/TSE.1986.6312940"},{"key":"key2022031519472808000_b21","unstructured":"Polanyi, M. (1973), Personal Knowledge, Routledge & Kegan Paul, London."},{"key":"key2022031519472808000_b22","unstructured":"Pressman, R.S. (1987), Software Engineering: A Practitioner\u2019s Approach, 2nd ed., McGraw\u2010Hill Book Company, New York, NY."},{"key":"key2022031519472808000_b23","doi-asserted-by":"crossref","unstructured":"Robey, D. and Markus, M.L. (1984), \u201cRituals in information systems design\u201d, MIS Quarterly, March, pp. 5\u201015.","DOI":"10.2307\/249240"},{"key":"key2022031519472808000_b24","doi-asserted-by":"crossref","unstructured":"Russo, N.L., Wynekoop, J. L. and Walz, D. (1995), \u201cThe use and adaptation of system development methodologies\u201d, Proceedings of the Information Resources Management Association International Conference, May.","DOI":"10.1177\/026839629501000209"},{"key":"key2022031519472808000_b25","unstructured":"Sch\u00f6n, D. (1987), Educating the Reflective Practitioner, Jossey\u2010Bass Publishers, San Francisco, CA."},{"key":"key2022031519472808000_b26","doi-asserted-by":"crossref","unstructured":"Shapiro, S. (1997), \u201cDegrees of freedom: the interaction of standards of practice and engineering judgment\u201d, Science, Technology, & Human Values, Vol. 22 No. 3, pp. 286\u2010316.","DOI":"10.1177\/016224399702200302"},{"key":"key2022031519472808000_b27","unstructured":"Stolterman, E. (1992), \u201cHow system designers think about design and methods: some reflections based on an interview study\u201d, Scandinavian Journal of Information Systems, Vol. 4 No. 1, pp. 137\u201050."},{"key":"key2022031519472808000_b28","unstructured":"Stolterman, E. and Russo, N.L. (1997), \u201cThe paradox of information systems methods: public and private rationalit\u201d, Proceedings of the British Computer Society\u2019s Annual Conference on Information System Methodologies, Fall."},{"key":"key2022031519472808000_b29","unstructured":"Suchman, L. (1987), Plans and Situated Actions \u2013 The Problems of Human\u2010Machine Communication, Cambridge University Press, Cambridge."},{"key":"key2022031519472808000_b30","unstructured":"Wetherbe, J.C. and Vitalari, N.P. (1994), Systems Analysis and Design: Best Practices, West Publishing Company, St Paul, MN."},{"key":"key2022031519472808000_b31","doi-asserted-by":"crossref","unstructured":"Wynekoop, J. and Russo, N. (1997), \u201cStudying system development methodologies: an examination of research methods\u2019\u2019, Information Systems Journal, Vol. 7 No. 1, pp. 47\u201065.","DOI":"10.1046\/j.1365-2575.1997.00004.x"},{"key":"key2022031519472808000_b32","doi-asserted-by":"crossref","unstructured":"Wynekoop, J.L. and Russo, N.L. (1995), \u201cSystem development methodologies\u201d, Journal of Information Technology, Summer, pp. 65\u201073.","DOI":"10.1177\/026839629501000209"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593840010359509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840010359509\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840010359509\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:32Z","timestamp":1753403792000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/13\/4\/313-327\/174712"}},"subtitle":["Their impact on past, present and future ISM research"],"short-title":[],"issued":{"date-parts":[[2000,12,1]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2000,12,1]]}},"alternative-id":["10.1108\/09593840010359509"],"URL":"https:\/\/doi.org\/10.1108\/09593840010359509","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2000,12,1]]}}}