{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:09:20Z","timestamp":1761487760460,"version":"3.41.2"},"reference-count":64,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,12,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper seeks to critique the notion of diffusionism.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The notion of diffusionism provides a general way of understanding innovation and human progress. It is pervasive within IS research and practice. Generically, diffusionism denotes an asymmetrical view of innovation as originating exclusively in \u201cprogressive\u201d centres, from which it spreads through an essentially passive recipient community. This model is pernicious, as it privileges an \u00e9lite few over the majority, with the innovator\/imitator dichotomy presented as natural, moral and inevitable. This paper analyses the notion of diffusionism in information systems (IS).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The failure to find any empirical support for diffusionism reveals both its mythical character and its ideological rationale in lending moral legitimacy to colonialistic projects. Empirical examples demonstrate both the ubiquity of the diffusionist mindset in IS research and practice, and its linkage to pseudo\u2010colonial activities in the home domain.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper concludes by arguing for a more critical approach within IS research on innovation, the use of richer, process\u2010based theories, and greater partnership with practitioners in order to close the research\/practice gap.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09593840510633851","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T18:02:59Z","timestamp":1168884179000},"page":"383-404","source":"Crossref","is-referenced-by-count":54,"title":["Diffusion \u2013 or delusion? Challenging an IS research tradition"],"prefix":"10.1108","volume":"18","author":[{"given":"Tom","family":"McMaster","sequence":"first","affiliation":[]},{"given":"David","family":"Wastell","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021120263954300_b1","doi-asserted-by":"crossref","unstructured":"Allen, B.A., Juillet, L., Paquet, G. and Roy, J. (2001), \u201cE\u2010governance and government on\u2010line in Canada: partnership, people and prospects\u201d, Government Information Quarterly, Vol. 18, pp. 93\u2010104.","DOI":"10.1016\/S0740-624X(01)00063-6"},{"key":"key2022021120263954300_b2","doi-asserted-by":"crossref","unstructured":"Ardis, M.A. and Marcolin, B.L. (2001), Diffusing Software Product and Process Innovations, Kluwer Academic Publishers, Boston, MA.","DOI":"10.1007\/978-0-387-35404-0"},{"key":"key2022021120263954300_b3","doi-asserted-by":"crossref","unstructured":"Avison, D., Lau, F., Neilsen, P.A. and Myers, M. (1999), \u201cAction research\u201d, Communications of the ACM, Vol. 42, pp. 94\u20107.","DOI":"10.1145\/291469.291479"},{"key":"key2022021120263954300_b5","doi-asserted-by":"crossref","unstructured":"Baskerville, R. and Wood\u2010Harper, A.T. (1998), \u201cDiversity of information systems: action research methods\u201d, European Journal of Information Systems, Vol. 7, pp. 90\u2010107.","DOI":"10.1057\/palgrave.ejis.3000298"},{"key":"key2022021120263954300_b4","doi-asserted-by":"crossref","unstructured":"Baskerville, R., Mathiassen, L., Pries\u2010Heje, J. and DeGross, J. (2005), Business Agility and Information Technology Diffusion, Springer, New York, NY.","DOI":"10.1007\/b135658"},{"key":"key2022021120263954300_b6","doi-asserted-by":"crossref","unstructured":"Blaut, J.M. (1987), \u201cDiffusionism: a uniformitarian critique\u201d, Annals of the Association of American Geographers, Vol. 77, pp. 30\u201047.","DOI":"10.1111\/j.1467-8306.1987.tb00143.x"},{"key":"key2022021120263954300_b7","unstructured":"Blaut, J.M. (1993), The Colonizer's Model of the World: Geographical Diffusionism and Eurocentric History, The Guilford Press, New York, NY."},{"key":"key2022021120263954300_b8","unstructured":"Bowler, P.J. (1989), The Invention of Progress, Basil Blackwell, Oxford."},{"key":"key2022021120263954300_b9","unstructured":"Bunker, D., Wilson, D. and Elliott, S. (Eds) (2002), \u201cThe adoption and diffusion of IT in an environment for critical change\u201d, Proceedings of IFIP WG8.6 International Working Conference, Sydney (forthcoming)."},{"key":"key2022021120263954300_b10","doi-asserted-by":"crossref","unstructured":"Carter, L. and Belanger, F. (2005), \u201cThe utilization of e\u2010government services: citizen trust, innovation and acceptance factors\u201d, Information Systems Journal (in press).","DOI":"10.1111\/j.1365-2575.2005.00183.x"},{"key":"key2022021120263954300_b11","unstructured":"Chin, W. (2001a), Personal e\u2010mail communication, 25 September."},{"key":"key2022021120263954300_b12","doi-asserted-by":"crossref","unstructured":"Chin, W. (2001b), The Data Base for Advances in Information Systems, Special Issue on Diffusion and Adoption, Vol. 32 No. 3","DOI":"10.1145\/3262676"},{"key":"key2022021120263954300_b13","unstructured":"Curnow, R. (1979), \u201cWhere is microelectronics taking us?\u201d, Personnel Management, Vol. 11 No. 9, pp. 40\u20102."},{"key":"key2022021120263954300_b14","doi-asserted-by":"crossref","unstructured":"Damsgaard, J. and Henriksen, H.Z. (Eds) (2004), \u201cNetworked information technologies: diffusion and adoption\u201d, Kluwer Academic Publishers, Boston, MA.","DOI":"10.1007\/b115736"},{"key":"key2022021120263954300_b15","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R. and Warshaw, P. (1989), \u201cUser acceptance of technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022021120263954300_b16","doi-asserted-by":"crossref","unstructured":"Davison, R. (2001), \u201cGSS and action research in the Hong Kong police\u201d, Information Technology & People, Vol. 14, pp. 60\u201077.","DOI":"10.1108\/09593840110694984"},{"key":"key2022021120263954300_b17","unstructured":"Ehn, P. and Kyng, M. (1987), Computers and Democracy: a Scandinavian Challenge, in Bjerknes, G., Ehn, P. and Kyng, M. (Eds), System Design and Industrial Democracy, Avebury, Aldershot, pp. 17\u201057."},{"key":"key2022021120263954300_b18","doi-asserted-by":"crossref","unstructured":"Fitzgerald, B. and Wynn, E. (Eds) (2004), IT Innovation for Adaptability and Competitiveness, Kluwer Academic Publishers, Boston, MA.","DOI":"10.1007\/b109386"},{"key":"key2022021120263954300_b19","unstructured":"Galliers, R.D. (1992), \u201cChoosing information systems research approaches\u201d, in Galliers, R.D. (Ed.), Information Systems Research, Blackwell Scientific Publications, Oxford, pp. 144\u201062."},{"key":"key2022021120263954300_b20","unstructured":"Greenwood, D.J. and Levin, M. (1998), Introduction to Action Research: Social Research for Social Change, Sage, London."},{"key":"key2022021120263954300_b21","doi-asserted-by":"crossref","unstructured":"Hardgrave, B.C., Davis, F. and Riemenschneider, C.K. (2003), \u201cInvestigating determinants of software developers intentions to follow methodologies\u201d, Journal of Management Information Systems, Vol. 20, pp. 123\u201051.","DOI":"10.1080\/07421222.2003.11045751"},{"key":"key2022021120263954300_b22","doi-asserted-by":"crossref","unstructured":"Hood, C. (1991), \u201cA public management for all seasons\u201d, Public Administration, Vol. 69, pp. 3\u201019.","DOI":"10.1111\/j.1467-9299.1991.tb00779.x"},{"key":"key2022021120263954300_b23","doi-asserted-by":"crossref","unstructured":"Iivari, J. (1996), \u201cWhy are CASE tools not used?\u201d, Communications of the ACM, Vol. 39, pp. 94\u2010103.","DOI":"10.1145\/236156.236183"},{"key":"key2022021120263954300_b24","doi-asserted-by":"crossref","unstructured":"Kautz, K. (2000), \u201cEditorial \u2013 special issue on diffusion\u201d, Information Technology & People, Vol. 13 No. 1.","DOI":"10.1108\/itp.2000.16113aaa.001"},{"key":"key2022021120263954300_b25","doi-asserted-by":"crossref","unstructured":"Kautz, K. and Pries\u2010Heje, J. (Eds) (1996), Diffusion and Adoption of Information Technology, Chapman & Hall, London.","DOI":"10.1007\/978-0-387-34982-4"},{"key":"key2022021120263954300_b26","unstructured":"Lamont, L.M. (1971), \u201cTechnology transfer, innovation and marketing in science\u2010oriented spin\u2010off firms\u201d, Institute of Science and Technology, University of Michigan, Ann Arbor."},{"key":"key2022021120263954300_b27","unstructured":"Larsen, T.J., Levine, L. and DeGross, J.I. (Eds) (1999), \u201cInformation systems: current issues and future changes\u201d, IFIP, Laxenburg."},{"key":"key2022021120263954300_b28","unstructured":"Latour, B. (1987), Science in Action: How to Follow Scientists and Engineers through Society, Harvard University Press, Cambridge, MA."},{"key":"key2022021120263954300_b31","unstructured":"Levine, L. (1994), Diffusion, Transfer and Implementation of Information Technology, Elsevier Science BV, Amsterdam."},{"key":"key2022021120263954300_b30","unstructured":"Levine, L. (2001), personal e\u2010mail communication, 23 September."},{"key":"key2022021120263954300_b33","doi-asserted-by":"crossref","unstructured":"Lyotard, J\u2010F. (1984), The Postmodern Condition: A Report on Knowledge, Manchester University Press, Manchester.","DOI":"10.2307\/1772278"},{"key":"key2022021120263954300_b37","unstructured":"McGuire, E. and Larsen, T.J. (Eds) (1998), Information Systems Innovation and Diffusion: Issues and Directions, Idea Group Publishing, Hershey, PA."},{"key":"key2022021120263954300_b38","doi-asserted-by":"crossref","unstructured":"McMaster, T. (2001), \u201cDiffusing software product and process innovations\u201d, in Ardis, M.A. and Marcolin, B.L. (Eds), The Illusion of Diffusion in Information Systems Research, Kluwer Academic Publishers, Boston, MA, pp. 67\u201085.","DOI":"10.1007\/978-0-387-35404-0_6"},{"key":"key2022021120263954300_b39","unstructured":"McMaster, T. and Kautz, K. (2002), \u201cA short history of diffusion\u201d, in Bunker, D., Wilson, D. and Elliott, S. (Eds), The Adoption and Diffusion of IT in an Environment for Critical Change, Pearson Publishing Service\/IFIP, Sydney, pp. 10\u201022."},{"key":"key2022021120263954300_b41","doi-asserted-by":"crossref","unstructured":"McMaster, T., Vidgen, R.T. and Wastell, D.G. (1997a), \u201cTechnology transfer \u2013 diffusion or translation?\u201d, in McMaster, T., Mumford, E., Swanson, E.B., Warboys, B. and Wastell, D. (Eds), Facilitating Technology Transfer through Partnership: Learning from Practice and Research, Chapman & Hall, London, pp. 64\u201075.","DOI":"10.1007\/978-0-387-35092-9_4"},{"key":"key2022021120263954300_b40","doi-asserted-by":"crossref","unstructured":"McMaster, T., Mumford, E., Swanson, E.B., Warboys, B. and Wastell, D. (Eds) (1997b), Facilitating Technology Transfer through Partnership: Learning from Practice and Research, Chapman & Hall, London.","DOI":"10.1007\/978-0-387-35092-9"},{"key":"key2022021120263954300_b34","unstructured":"Malik, R. (1982), \u201cElectronics to change world because of applications range\u201d, Computing Canada, Vol. 8 No. 6, p. 14."},{"key":"key2022021120263954300_b35","unstructured":"Malinowski, B. (1927), The Life Cultures, in Smith, G.E. (Ed.), Culture: the Diffusion Controversy, Norton, New York."},{"key":"key2022021120263954300_b36","unstructured":"Mansfield, E., Romeo, A., Schwartz, M., Teece, D., Wagner, S. and Brach, P. (1983), \u201cNew findings in technology transfer, productivity and economic policy\u201d, Research Management, Vol. 26 No. 2, pp. 11\u201020."},{"key":"key2022021120263954300_b42","unstructured":"Mumford, E. (1983), Designing Human Systems for New Technology: The ETHICS Method, Manchester Business School, Manchester."},{"key":"key2022021120263954300_b43","doi-asserted-by":"crossref","unstructured":"Negrotti, M. (1984), \u201cCultural dynamics in the diffusion of informatics\u201d, Futures, Vol. 16 No. 1, pp. 38\u201046.","DOI":"10.1016\/0016-3287(84)90005-3"},{"key":"key2022021120263954300_b44","doi-asserted-by":"crossref","unstructured":"Newman, M. and Robey, D. (1992), \u201cA social process of user\u2010analyst relationships\u201d, MIS Quarterly, Vol. 16, pp. 249\u201066.","DOI":"10.2307\/249578"},{"key":"key2022021120263954300_b45","doi-asserted-by":"crossref","unstructured":"Orlikowski, W. (1993), \u201cCASE tools as organizational change: investigating incremental and radical changes in system development\u201d, MIS Quarterly, Vol. 17, pp. 309\u201040.","DOI":"10.2307\/249774"},{"key":"key2022021120263954300_b46","doi-asserted-by":"crossref","unstructured":"Pinch, T. and Bijker, W.E. (1984), \u201cThe social construction of facts and artefacts: or how the sociology of science and the sociology of technology might benefit each other\u201d, Social Studies of Science, Vol. 14, pp. 399\u2010441.","DOI":"10.1177\/030631284014003004"},{"key":"key2022021120263954300_b47","doi-asserted-by":"crossref","unstructured":"Porra, J. (1999), \u201cColonial systems\u201d, Information Systems Research, Vol. 10, pp. 38\u201069.","DOI":"10.1287\/isre.10.1.38"},{"key":"key2022021120263954300_b48","doi-asserted-by":"crossref","unstructured":"Prescott, M. Ed. (1995), The Data Base for Advances in Information Systems, Special Issue on diffusion and adoption of IT, Vol. 26 No. 2 and 3.","DOI":"10.1145\/217278.217283"},{"key":"key2022021120263954300_b49","doi-asserted-by":"crossref","unstructured":"Robey, D. and Boudreau, M\u2010C. (1999), \u201cAccounting for contradictory consequences of information technology: theoretical directions and methodological implications\u201d, Information Systems Research, Vol. 10, pp. 167\u201085.","DOI":"10.1287\/isre.10.2.167"},{"key":"key2022021120263954300_b50","unstructured":"Rogers, C.R. (1983), Freedom to Learn for the '80s, Merrill Publishing Company, Columbus, OH."},{"key":"key2022021120263954300_b51","unstructured":"Rogers, E.M. (1962), Diffusion of Innovations, 1st ed., The Free Press, New York, NY."},{"key":"key2022021120263954300_b52","unstructured":"Rogers, E.M. (1995), Diffusion of Innovations, 4th ed., The Free Press, New York, NY."},{"key":"key2022021120263954300_b53","unstructured":"Rogers, E.M. (2003), Diffusion of Innovations, 5th ed., The Free Press, New York, NY."},{"key":"key2022021120263954300_b54","unstructured":"Rosenbloom, R.S. (1965), Technology Transfer, Process and Policy: An Analysis of the Utilization of Technological By\u2010Products of Military and Space Defense R&D, National Planning Association, Washington, DC."},{"key":"key2022021120263954300_b55","doi-asserted-by":"crossref","unstructured":"Simon, S.J. (2000), \u201cThe reorganisation of the information systems of the US Naval Construction forces: an action research project\u201d, European Journal of Information Systems, Vol. 9, pp. 148\u201062.","DOI":"10.1057\/palgrave.ejis.3000363"},{"key":"key2022021120263954300_b56","doi-asserted-by":"crossref","unstructured":"Swanson, E.B. (1982), \u201cMeasuring user attitudes in MIS research: a review\u201d, OMEGA International Journal of Science, Vol. 10 No. 2, pp. 157\u201065.","DOI":"10.1016\/0305-0483(82)90050-0"},{"key":"key2022021120263954300_b57","doi-asserted-by":"crossref","unstructured":"Tarde, G. (1890), The Laws of Imitation (Les Lois de L'Imitation: Etude Sociologique), English translation 1903 (out of print).","DOI":"10.2307\/1411168"},{"key":"key2022021120263954300_b58","unstructured":"Todaro, M.P. (1969), \u201cSome thoughts on the transfer of technology from developed to less\u2010developed nations\u201d, Institute for Development Studies, University College, Nairobi."},{"key":"key2022021120263954300_b59","unstructured":"Ulwick, T. and Eisenhauer, J.A. (2002), Predicting the Success or Failure of a New Product Concept, white paper, available at: www.strategyn.com."},{"key":"key2022021120263954300_b60","unstructured":"Wastell, D., Kawalek, P. and Newman, M. (2003), \u201cPlus \u00e7a change: defensive translations and resistance to IT\u2010enabled change in local government\u201d, Proceedings of ECIS, Naples, Italy."},{"key":"key2022021120263954300_b61","unstructured":"Van de Ven, A.H. (1995), \u201cManaging the process of organizational innovation\u201d, in Huber, G. and Glick, W. (Eds), Organisational Change and Redesign, Oxford University Press, New York, NY, pp. 269\u201094."},{"key":"key2022021120263954300_b62","unstructured":"Young, M.E. (1977), Technology Transfer: General and Theoretical Studies (A Bibliography with Abstracts), US Department of Commerce, National Technical Information Service, Springfield, VA."},{"key":"key2022021120263954300_b63","doi-asserted-by":"crossref","unstructured":"Zmud, R.W. (1979), \u201cIndividual differences and MIS success: a review of the empirical literature\u201d, Management Science, Vol. 25 No. 10, pp. 966\u201079.","DOI":"10.1287\/mnsc.25.10.966"},{"key":"key2022021120263954300_b64","doi-asserted-by":"crossref","unstructured":"Zmud, R.W. (1982), \u201cDiffusion of modern software practices: influence of centralization and formalization\u201d, Management Science, Vol. 28, pp. 1421\u201031.","DOI":"10.1287\/mnsc.28.12.1421"},{"key":"key2022021120263954300_frg1","unstructured":"Latour, B. (1993), We Have Never Been Modern, Harvester Wheatsheaf, Hemel Hempstead."},{"key":"key2022021120263954300_frg2","unstructured":"Lunblad, J. (2003), \u201cA review and critique of Rogers' diffusion of innovation theory as it applies to organisations\u201d, Organisational Development Journal, Vol. 21, pp. 50\u201064."}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593840510633851","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840510633851\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840510633851\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:47Z","timestamp":1753403807000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/18\/4\/383-404\/431161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12,1]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,12,1]]}},"alternative-id":["10.1108\/09593840510633851"],"URL":"https:\/\/doi.org\/10.1108\/09593840510633851","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2005,12,1]]}}}