{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T02:55:17Z","timestamp":1776480917424,"version":"3.51.2"},"reference-count":58,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2010,8,17]],"date-time":"2010-08-17T00:00:00Z","timestamp":1282003200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8,17]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to propose an extended version of systems development life cycle (SDLC) based on critical systems thinking for information system (IS) adoption in an organizational context from a management perspective.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The model integrates traditional SDLC with the ongoing process of \u201cphase\u2010stakeholders\u2010identification\u201d or \u201cpha\u2010stak\u2010ification\u201d. The emerging systemic stakeholder networks is proposed to be applied with network mechanisms to influence stakeholders' attitudes towards IS adoption. The authors, considering IS adoption as a multi\u2010phase innovation project, argue that boundary considerations using a multiple stakeholder perspective (boundary critique) provides an alternative focus for IS adoption.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The study suggests that the proposed model has the capacity to serve as a roadmap for a smooth IS adoption by facilitating organizational learning and change.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The study has not been tested empirically.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Successful IS implementation improves organizational efficiency and creates competitive advantage. Established information technology adoption models like technology acceptance model and theory of reasoned action consider technology adoption from the users' viewpoint without taking a holistic perspective into account. This article takes a systems perspective to technology development and the systems development life cycle.<\/jats:p><\/jats:sec>","DOI":"10.1108\/13287261011070821","type":"journal-article","created":{"date-parts":[[2010,8,28]],"date-time":"2010-08-28T07:09:48Z","timestamp":1282979388000},"page":"196-209","source":"Crossref","is-referenced-by-count":24,"title":["Towards a systemic model on information systems' adoption using critical systems thinking"],"prefix":"10.1108","volume":"12","author":[{"given":"Syed","family":"Arshad Raza","sequence":"first","affiliation":[]},{"given":"Craig","family":"Standing","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021220111625400_b1","doi-asserted-by":"crossref","unstructured":"Achterkamp, M.C. and Vos, J.F.J. (2007), \u201cCritically identifying stakeholders evaluating boundary critique as a vehicle for stakeholder identification\u201d, Systems Research and Behavioral Science, Vol. 24 No. 1, pp. 3\u201014.","DOI":"10.1002\/sres.760"},{"key":"key2022021220111625400_b2","unstructured":"Ackoff, R.L. (1999), Ackoff's Best \u2013 His Classic Writings on Management, Wiley & Sons, New York, NY."},{"key":"key2022021220111625400_b3","doi-asserted-by":"crossref","unstructured":"Agarwal, R., Tanniru, M. and Wilemon, D. (1997), \u201cAssimilating information technology innovations: strategies and moderating influences\u201d, IEEE Transactions on Engineering Management, Vol. 44 No. 4, pp. 347\u201058.","DOI":"10.1109\/17.649864"},{"key":"key2022021220111625400_b4","doi-asserted-by":"crossref","unstructured":"Ajzen, I. (1991), \u201cThe theory of planned behavior\u201d, Organizational Behavior and Human Decision Processes, Vol. 50 No. 2, pp. 179\u2010211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"key2022021220111625400_b5","unstructured":"Ajzen, I. and Fishbein, M. (1980), Understanding Attitude and Predicting Social Behaviour, Prentice\u2010Hall, Eaglewood Cliff, NJ."},{"key":"key2022021220111625400_b6","unstructured":"Azzara, C. and Garone, S. (2003), \u201cIT adoption profiles and application implementation failures\u201d, A report by AlignIT Group."},{"key":"key2022021220111625400_b7","unstructured":"Beinhocker, E.D. (1997), \u201cStrategy at the edge of chaos\u201d, The McKinsey Quarterly, Vol. 1, pp. 24\u201040."},{"key":"key2022021220111625400_b8","doi-asserted-by":"crossref","unstructured":"Berrisford, T.R. and Wetherbe, J.C. (1979), \u201cHeuristic development: a redesign of systems design\u201d, MIS Quarterly, Vol. 3 No. 1, pp. 11\u201019.","DOI":"10.2307\/249144"},{"key":"key2022021220111625400_b9","unstructured":"Bertalanffy, L. (1975), Perspectives on General Systems Theory: Scientific\u2010Philosophical Studies, Braziller, New York, NY."},{"key":"key2022021220111625400_b10","doi-asserted-by":"crossref","unstructured":"Burt, R.S. (1980), \u201cModels of network structure\u201d, Annual Review of Sociology, Vol. 6, pp. 79\u2010141.","DOI":"10.1146\/annurev.so.06.080180.000455"},{"key":"key2022021220111625400_b11","doi-asserted-by":"crossref","unstructured":"Cao, G., Clarke, S. and Lehaney, B. (2003), \u201cDiversity management in organizational change: towards a systemic framework\u201d, Systems Research and Behavioral Science, Vol. 20 No. 3, pp. 231\u201042.","DOI":"10.1002\/sres.530"},{"key":"key2022021220111625400_b12","doi-asserted-by":"crossref","unstructured":"Churchman, C.W. (1970), \u201cOperations research as a profession\u201d, Management Science, Vol. 17, pp. B37\u201053.","DOI":"10.1287\/mnsc.17.2.B37"},{"key":"key2022021220111625400_b13","unstructured":"Churchman, C.W. (1979), The Systems Approach and its Enemies, Basic Books, New York, NY."},{"key":"key2022021220111625400_b14","unstructured":"Cooper, R. and Markus, M.L. (1995), \u201cHuman reengineering\u201d, Sloan Management Review, Vol. 36 No. 4, pp. 39\u201050."},{"key":"key2022021220111625400_b15","unstructured":"Cummings, T.G. and Worley, C.G. (1993), Organization Development and Change, West Publishing, St. Paul, MN."},{"key":"key2022021220111625400_b16","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13, pp. 319\u201040.","DOI":"10.2307\/249008"},{"key":"key2022021220111625400_b17","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35, pp. 982\u20101002.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022021220111625400_b18","doi-asserted-by":"crossref","unstructured":"Donaldson, T. and Preston, L.E. (1995), \u201cThe stakeholder theory of corporation: concepts, evidence, and implications\u201d, Academy of Management Review, Vol. 20, pp. 65\u201091.","DOI":"10.5465\/amr.1995.9503271992"},{"key":"key2022021220111625400_b19","doi-asserted-by":"crossref","unstructured":"Dow, G. (1988), \u201cConfigurational and coactivational views of organizational structure\u201d, Academy of Management Review, Vol. 13 No. 1, pp. 53\u201064.","DOI":"10.5465\/amr.1988.4306781"},{"key":"key2022021220111625400_b20","unstructured":"Erickson, B. (1988), \u201cThe relational basis of attitudes\u201d, in Wellman, B. and Berkowitz (Eds), Social Structures: A Network Approach, Cambridge University Press, New York, NY."},{"key":"key2022021220111625400_b21","doi-asserted-by":"crossref","unstructured":"Festinger, L., Schacter, S. and Back, K. (1950), \u201cSocial pressures in informal groups: a study of human factors in housing\u201d, in Rice, R.E. and Aydin, C. (1991), \u201cAttitudes toward new organizational technology: network proximity as a mechanism for social information processing\u201d, Administrative Science Quarterly, Vol. 36 No. 2, pp. 219\u201044.","DOI":"10.2307\/2393354"},{"key":"key2022021220111625400_b22","unstructured":"Freeman, R.E. (1984), Strategic Management: A Stakeholder Approach, Pitman, Boston, MA."},{"key":"key2022021220111625400_b23","doi-asserted-by":"crossref","unstructured":"Freeman, R.E. and Evan, W.M. (1990), \u201cCorporate governance: a stakeholder interpretation\u201d, The Journal of Behavioral Economics, Vol. 19, pp. 337\u201059.","DOI":"10.1016\/0090-5720(90)90022-Y"},{"key":"key2022021220111625400_b24","doi-asserted-by":"crossref","unstructured":"Frooman, J. (1999), \u201cStakeholder influence strategies\u201d, The Academy of Management Review, Vol. 24 No. 2, pp. 191\u2010205.","DOI":"10.5465\/amr.1999.1893928"},{"key":"key2022021220111625400_b25","unstructured":"Gremillion, L.L. and Pyburn, P. (1983), \u201cBreaking the systems development bottleneck\u201d, Harvard Business Review, Vol. 61 No. 1, pp. 130\u20107."},{"key":"key2022021220111625400_b26","doi-asserted-by":"crossref","unstructured":"Hackman, J.R. (1983), \u201cGroup influences on individuals\u201d, in Rice R.E. and Aydin C. (1991), \u201cAttitudes toward new organizational technology: network proximity as a mechanism for social information processing\u201d, Administrative Science Quarterly, Vol. 36 No. 2, pp. 219\u201044.","DOI":"10.2307\/2393354"},{"key":"key2022021220111625400_b27","unstructured":"Hall, G.E. and Hord, S.M. (1987), Change in Schools: Facilitating the Process, SUNY Press, Albany, NY."},{"key":"key2022021220111625400_b28","unstructured":"Hall, G.E. and Hord, S.M. (2006), Implementing Change. Practices, Principles and Potholes, Pearson, Boston, MA."},{"key":"key2022021220111625400_b29","doi-asserted-by":"crossref","unstructured":"Harkness, W.L., Kettinger, W.J. and Segars, A.H. (1996), \u201cSustaining process improvement and innovation in the information services function: lessons learned from Bose corporation\u201d, MIS Quarterly, Vol. 20 No. 3, pp. 349\u201068.","DOI":"10.2307\/249661"},{"key":"key2022021220111625400_b30","doi-asserted-by":"crossref","unstructured":"Hartman, R. and Johnson, J.D. (1989), \u201cSocial contagion and multiplexity: communication networks as predictors of commitment and role ambiguity\u201d, Human Communication Research, Vol. 15, pp. 523\u201048.","DOI":"10.1111\/j.1468-2958.1989.tb00198.x"},{"key":"key2022021220111625400_b31","doi-asserted-by":"crossref","unstructured":"Jackson, M.C. (2006), \u201cCreative holism: a critical systems approach to complex problem situations\u201d, Systems Research and Behavioral Science, Vol. 23 No. 5, pp. 647\u201057.","DOI":"10.1002\/sres.799"},{"key":"key2022021220111625400_b32","unstructured":"Jick, T.D. (1993), Managing Change, Cases and Concepts, Irwin, Homewood, IL."},{"key":"key2022021220111625400_b33","doi-asserted-by":"crossref","unstructured":"Kettinger, W.J., Teng, J.T.C. and Guha, S. (1997), \u201cBusiness process change: a study of methodologies, techniques, and tools\u201d, MIS Quarterly, Vol. 21 No. 1, pp. 55\u201081.","DOI":"10.2307\/249742"},{"key":"key2022021220111625400_b34","unstructured":"Kroenke, D.M. (2009), Using MIS, Pearson Prentice Hall, Upper Saddle River, NJ."},{"key":"key2022021220111625400_b35","doi-asserted-by":"crossref","unstructured":"McIlduff, E. and Coghlan, D. (2000), \u201cUnderstanding and contending with passive\u2010aggressive behaviour in teams and organizations\u201d, Journal of Managerial Psychology, Vol. 15 No. 7, pp. 716\u201032.","DOI":"10.1108\/02683940010378072"},{"key":"key2022021220111625400_b36","doi-asserted-by":"crossref","unstructured":"Mahmood, M.A. (1987), \u201cSystem development methods \u2013 a comparative investigation\u201d, MIS Quarterly, Vol. 27 No. 3, pp. 293\u2010311.","DOI":"10.2307\/248674"},{"key":"key2022021220111625400_b37","doi-asserted-by":"crossref","unstructured":"Malmsj\u00f6, A. and \u00d6velius, E. (2003), \u201cFactors that induce change in information systems\u201d, Systems Research and Behavioral Science, Vol. 20 No. 3, pp. 243\u201053.","DOI":"10.1002\/sres.531"},{"key":"key2022021220111625400_b38","doi-asserted-by":"crossref","unstructured":"Midgley, G. (2003), \u201cScience as systemic intervention: some implications of systems thinking and complexity for the philosophy of science\u201d, Systemic Practice and Action Research, Vol. 16 No. 2, pp. 77\u201097.","DOI":"10.1023\/A:1022833409353"},{"key":"key2022021220111625400_b39","unstructured":"Midgley, G. (2007), \u201cSystems thinking for evaluation\u201d, in Williams, B. and Imam, I. (Eds), Systems Concepts in Evaluation. An Expert Anthology, American Evaluation Association, Edgepress, Point Reyes, CA."},{"key":"key2022021220111625400_b40","doi-asserted-by":"crossref","unstructured":"Mitchell, R.K., Agle, B.R. and Wood, D.J. (1997), \u201cToward a theory of stakeholder identification and salience: defining the principle of who and what really counts\u201d, Academy of Management Review, Vol. 22 No. 4, pp. 853\u201086.","DOI":"10.5465\/amr.1997.9711022105"},{"key":"key2022021220111625400_b41","doi-asserted-by":"crossref","unstructured":"Mulej, M. (2007), \u201cSystems theory: a worldview and\/or a methodology aimed at requisite holism\/realism of humans' thinking, decisions and action\u201d, Systems Research and Behavioral Science, Vol. 24 No. 3, pp. 347\u201057.","DOI":"10.1002\/sres.810"},{"key":"key2022021220111625400_b42","doi-asserted-by":"crossref","unstructured":"Nilakanta, S. and Scamell, R.W. (1990), \u201cThe effect of information sources and communication channels on the diffusion of innovation in a database development environment\u201d, Management Science, Vol. 36 No. 1, pp. 24\u201040.","DOI":"10.1287\/mnsc.36.1.24"},{"key":"key2022021220111625400_b43","unstructured":"Nohria, N. and Eccles, R.G. (1992), Networks and Organizations: Structure, Form and Action, Harvard Business School Press, Boston, MA, pp. 1\u201022."},{"key":"key2022021220111625400_b44","unstructured":"O' Brien, J.A. (2005), Introduction to Information Systems, McGraw\u2010Hill, New York, NY."},{"key":"key2022021220111625400_b45","doi-asserted-by":"crossref","unstructured":"Paper, D., Rodger, J. and Pendharkar, P. (2000), \u201cDevelopment and testing of a theoretical model of transformation\u201d, Proceedings of the 33rd Hawaii International Conference on Systems Sciences, pp. 1\u20109.","DOI":"10.1109\/HICSS.2000.926592"},{"key":"key2022021220111625400_b46","unstructured":"Rogers, E.M. (1995), Diffusion of Innovations, 4th ed., The Free Press, New York, NY."},{"key":"key2022021220111625400_b47","unstructured":"Rogers, E.M. and Kincaid, L.D. (1981), Communication Networks: Toward a New Paradigm for Research, Free Press, New York, NY."},{"key":"key2022021220111625400_b48","doi-asserted-by":"crossref","unstructured":"Rowley, T.J. (1997), \u201cMoving beyond dyadic ties: a network theory of stakeholder influences\u201d, The Academy of Management Review, Vol. 22 No. 4, pp. 887\u2010910.","DOI":"10.5465\/amr.1997.9711022107"},{"key":"key2022021220111625400_b49","doi-asserted-by":"crossref","unstructured":"Seilheimer, S.D. (2000), \u201cInformation management during systems development\u201d, International Journal of Information Management, Vol. 20, pp. 287\u201095.","DOI":"10.1016\/S0268-4012(00)00017-7"},{"key":"key2022021220111625400_b50","doi-asserted-by":"crossref","unstructured":"Singh, J. (2005), \u201cCollaborative networks as determinants of knowledge diffusion patterns\u201d, Management Science, Vol. 51 No. 5, pp. 756\u201070.","DOI":"10.1287\/mnsc.1040.0349"},{"key":"key2022021220111625400_b51","doi-asserted-by":"crossref","unstructured":"Teng, T.C., Jeong, S.R. and Grover, V. (1998), \u201cProfiling successful reengineering projects\u201d, Communications of the ACM, Vol. 41 No. 6, pp. 96\u2010102.","DOI":"10.1145\/276609.276625"},{"key":"key2022021220111625400_b52","unstructured":"Ulrich, W. (1983), Critical Heuristics of Social Planning. A New Approach to Practical Philosophy, Wiley, Chichester."},{"key":"key2022021220111625400_b53","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. and Davis, F.D. (2000), \u201cA theoretical extension of the technology acceptance model: four longitudinal field studies\u201d, Management Science, Vol. 46 No. 2, pp. 186\u2010204.","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"key2022021220111625400_b54","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly, Vol. 27, pp. 425\u201078.","DOI":"10.2307\/30036540"},{"key":"key2022021220111625400_b55","doi-asserted-by":"crossref","unstructured":"Vos, J.F.J. (2003), \u201cCorporate social responsibility and the identification of stakeholders\u201d, Corporate Social Responsibility and Environmental Management, Vol. 10 No. 3, pp. 141\u201052.","DOI":"10.1002\/csr.39"},{"key":"key2022021220111625400_b56","doi-asserted-by":"crossref","unstructured":"Wilby, J. (2005), \u201cCombining a systems framework with epidemiology in the study of emerging infectious disease\u201d, Systems Research and Behavioral Science, Vol. 22 No. 2, pp. 385\u201098.","DOI":"10.1002\/sres.714"},{"key":"key2022021220111625400_b57","unstructured":"Yardley, D. (2002), Successful IT Project Delivery: Learning the Lessons of Project Failure, Addison\u2010Wesley, Boston, MA."},{"key":"key2022021220111625400_b58","unstructured":"Zaltman, G., Duncan, R.B. and Holbek, J. (1973), Innovation and Organization, Wiley, New York, NY."}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/13287261011070821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13287261011070821\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13287261011070821\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:24:18Z","timestamp":1753403058000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/12\/3\/196-209\/248425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,17]]},"references-count":58,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,8,17]]}},"alternative-id":["10.1108\/13287261011070821"],"URL":"https:\/\/doi.org\/10.1108\/13287261011070821","relation":{},"ISSN":["1328-7265"],"issn-type":[{"value":"1328-7265","type":"print"}],"subject":[],"published":{"date-parts":[[2010,8,17]]}}}