{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:36:23Z","timestamp":1772555783739,"version":"3.50.1"},"reference-count":70,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T00:00:00Z","timestamp":1525392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"published-print":{"date-parts":[[2018,5,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>Existing studies of information systems development (ISD) control commonly examine controller-centric considerations, such as the antecedents and performance impacts of control mode choices. In contrast, little is known about the controllee-centric factors that may influence the effectiveness of control activities. Drawing on institutional theory, the purpose of this paper is to introduce the concept of control legitimacy to the ISD literature \u2013 a concept that past organizational research has linked to outcomes such as employee commitment and performance. Specifically, the authors explore how different dimensions of control activities (mode, degree, style) relate to controllee perceptions of control legitimacy in terms of justice, autonomy, group identification, and competence development.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Interviews were conducted with 20 practitioners across three companies. A structured data coding approach was employed and analysis was conducted within and across each case study.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The authors find that the control degree and control style can help explain control legitimacy perceptions better than control modes alone. For example, the results suggest that formal controls enacted in a bilateral style correspond with higher perceptions of justice and autonomy, when compared to formal controls enacted in a unilateral style.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The study results imply that ISD managers should be increasingly mindful of enacting controls in a way that is perceived to be legitimate by subordinates, thereby potentially enhancing both staff well-being and ISD performance.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-11-2016-0275","type":"journal-article","created":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T10:00:41Z","timestamp":1525428041000},"page":"712-740","source":"Crossref","is-referenced-by-count":24,"title":["Perceptions of control legitimacy in information systems development"],"prefix":"10.1108","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5819-3074","authenticated-orcid":false,"given":"W. Alec","family":"Cram","sequence":"first","affiliation":[]},{"given":"Martin","family":"Wiener","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2018,5,4]]},"reference":[{"issue":"3","key":"key2021041507292711900_ref001","doi-asserted-by":"crossref","first-page":"586","DOI":"10.5465\/amr.1991.4279484","article-title":"Managerial fads and fashions: the diffusion and rejection of innovations","volume":"16","year":"1991","journal-title":"Academy of Management Review"},{"issue":"1","key":"key2021041507292711900_ref002","doi-asserted-by":"crossref","first-page":"254","DOI":"10.5465\/amr.1996.9602161572","article-title":"Management fashion","volume":"21","year":"1996","journal-title":"Academy of Management Review"},{"issue":"2","key":"key2021041507292711900_ref003","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/S1471-7727(01)00012-4","article-title":"Confessions of an information worker: a critical analysis of information requirements discourse","volume":"12","year":"2002","journal-title":"Information and Organization"},{"issue":"3","key":"key2021041507292711900_ref004","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.infoandorg.2009.04.002","article-title":"Introduction to designing information and organizations with a positive lens","volume":"19","year":"2009","journal-title":"Information and Organization"},{"issue":"9-10","key":"key2021041507292711900_ref005","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.infsof.2007.09.004","article-title":"Motivation in software engineering: a systematic literature review","volume":"50","year":"2008","journal-title":"Information and Software Technology"},{"key":"key2021041507292711900_ref006","volume-title":"The Social Construction of Reality","year":"1967"},{"key":"key2021041507292711900_ref007","doi-asserted-by":"crossref","unstructured":"Bijlsma-Frankema, K.M. and Costa, A.C. (2010), \u201cConsequences and antecedents of managerial and employee legitimacy interpretations of control: a natural open system approach\u201d, in Sitkin, S.B., Cardinal, L.B. and Bijlsma-Frankema, K.M. (Eds), Organizational Control, Cambridge University Press, Cambridge, pp. 396-433.","DOI":"10.1017\/CBO9780511777899.014"},{"issue":"3\/4","key":"key2021041507292711900_ref008","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1108\/02683949910263747","article-title":"Polychronicity and the inventory of polychronic values (IPV): the development of an instrument to measure a fundamental dimension of organizational culture","volume":"14","year":"1999","journal-title":"Journal of Managerial Psychology"},{"issue":"2","key":"key2021041507292711900_ref009","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1057\/ejis.2009.8","article-title":"If someone is watching, I\u2019ll do what I\u2019m asked: mandatoriness, control, and information security","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"key2021041507292711900_ref010","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1111\/j.1744-6570.1989.tb00676.x","article-title":"Computer-aided monitoring: its influence on employee job satisfaction and turnover","volume":"42","year":"1989","journal-title":"Personnel Psychology"},{"issue":"3","key":"key2021041507292711900_ref011","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1287\/isre.14.3.291.16563","article-title":"Portfolios of control in outsourced software development projects","volume":"14","year":"2003","journal-title":"Information Systems Research"},{"key":"key2021041507292711900_ref012","article-title":"Information systems control: a review and synthesis of the literature","year":"2011"},{"key":"key2021041507292711900_ref013","article-title":"Beyond modes: a new typology of management control","year":"2010"},{"issue":"2","key":"key2021041507292711900_ref014","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1111\/j.1365-2575.2012.00411.x","article-title":"Controlling systems development: a new typology for an evolving field","volume":"23","year":"2013","journal-title":"Information Systems Journal"},{"issue":"3","key":"key2021041507292711900_ref015","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1111\/isj.12059","article-title":"Hitting a moving target: a process model of information systems control change","volume":"26","year":"2016","journal-title":"Information Systems Journal"},{"issue":"4","key":"key2021041507292711900_ref016","doi-asserted-by":"crossref","first-page":"216","DOI":"10.17705\/1jais.00427","article-title":"Information systems control: a review and framework for emerging information systems","volume":"17","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"key2021041507292711900_ref017","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.im.2015.09.012","article-title":"Information systems control alignment: complementary and conflicting systems development controls","volume":"53","year":"2016","journal-title":"Information & Management"},{"issue":"2","key":"key2021041507292711900_ref018","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/2095101","article-title":"The iron cage revisited: institutional isomorphism and collective rationality in organizational fields","volume":"48","year":"1983","journal-title":"American Sociological Review"},{"issue":"1","key":"key2021041507292711900_ref019","first-page":"122","article-title":"Organizational legitimacy: social values and organizational behavior","volume":"18","year":"1975","journal-title":"Sociological Perspectives"},{"issue":"2","key":"key2021041507292711900_ref020","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1287\/mnsc.31.2.134","article-title":"Control: organizational and economic approaches","volume":"31","year":"1985","journal-title":"Management Science"},{"issue":"1","key":"key2021041507292711900_ref021","doi-asserted-by":"crossref","first-page":"57","DOI":"10.5465\/amr.1989.4279003","article-title":"Agency theory: an assessment and review","volume":"14","year":"1989","journal-title":"Academy of Management Review"},{"issue":"1","key":"key2021041507292711900_ref022","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/j.1365-2575.1996.tb00002.x","article-title":"Formalized systems development methodologies: a critical perspective","volume":"6","year":"1996","journal-title":"Information Systems Journal"},{"issue":"1","key":"key2021041507292711900_ref023","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/0361-3682(85)90030-3","article-title":"Toward and integrative framework of organizational control","volume":"10","year":"1985","journal-title":"Accounting, Organizations and Society"},{"issue":"2","key":"key2021041507292711900_ref024","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.jss.2010.09.022","article-title":"Antecedents to IT personnel\u2019s intentions to leave: a systematic literature review","volume":"84","year":"2011","journal-title":"The Journal of Systems and Software"},{"issue":"3","key":"key2021041507292711900_ref025","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1057\/ejis.2013.3","article-title":"Blending bureaucratic and collaborative management styles to achieve control ambidexterity in IS projects","volume":"23","year":"2014","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"key2021041507292711900_ref026","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.25300\/MISQ\/2013\/37.4.10","article-title":"Control balancing in information systems development offshoring projects","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2021041507292711900_ref027","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1287\/mnsc.38.6.757","article-title":"Managing I\/S design teams: a control theories perspective","volume":"38","year":"1992","journal-title":"Management Science"},{"issue":"4","key":"key2021041507292711900_ref028","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1057\/jit.2014.11","article-title":"To coerce or to enable? Exercising formal control in a large information systems project","volume":"30","year":"2015","journal-title":"Journal of Information Technology"},{"key":"key2021041507292711900_ref029","volume-title":"Organization Theory: Tension and Change","year":"1991"},{"issue":"3","key":"key2021041507292711900_ref030","doi-asserted-by":"crossref","first-page":"547","DOI":"10.2307\/25148807","article-title":"Turnover of information technology professionals: a narrative review, meta-analytic structural equation modeling, and model development","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2021041507292711900_ref031","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1108\/09593841111158356","article-title":"Investigating the design process: participatory design in agile software development","volume":"24","year":"2011","journal-title":"Information Technology & People"},{"issue":"6","key":"key2021041507292711900_ref032","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1057\/ejis.2012.42","article-title":"How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects","volume":"22","year":"2013","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2021041507292711900_ref033","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/orsc.7.1.1","article-title":"The management of complex tasks in organizations: controlling the systems development process","volume":"7","year":"1996","journal-title":"Organization Science"},{"issue":"3","key":"key2021041507292711900_ref034","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1287\/isre.8.3.215","article-title":"Portfolios of control modes and IS project management","volume":"8","year":"1997","journal-title":"Information Systems Research"},{"issue":"4","key":"key2021041507292711900_ref035","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1287\/mnsc.48.4.484.204","article-title":"Controlling information systems development projects: the view from the client","volume":"48","year":"2002","journal-title":"Management Science"},{"issue":"3","key":"key2021041507292711900_ref036","doi-asserted-by":"crossref","first-page":"363","DOI":"10.2307\/25148644","article-title":"Informating the clan: controlling physicians\u2019 costs and outcomes","volume":"28","year":"2004","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2021041507292711900_ref037","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s10796-007-9062-3","article-title":"Turnover intentions of Indian IS professionals","volume":"10","year":"2008","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"key2021041507292711900_ref038","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/j.ijproman.2009.05.006","article-title":"Task completion competency and project management performance: the influence of control and user contribution","volume":"28","year":"2010","journal-title":"International Journal of Project Management"},{"issue":"5","key":"key2021041507292711900_ref039","first-page":"465","article-title":"Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies","volume":"25","year":"2015","journal-title":"Information Systems Journal"},{"issue":"3","key":"key2021041507292711900_ref040","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1287\/isre.1090.0238","article-title":"A control theory perspective on agile methodology use and changing user requirements","volume":"20","year":"2009","journal-title":"Information Systems Research"},{"issue":"2","key":"key2021041507292711900_ref041","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1086\/226550","article-title":"Institutional organizations: formal structure as a myth and ceremony","volume":"83","year":"1977","journal-title":"American Journal of Sociology"},{"issue":"1","key":"key2021041507292711900_ref042","doi-asserted-by":"crossref","first-page":"191","DOI":"10.2753\/MIS0742-1222300106","article-title":"The impact of influence tactics in information system development projects: a control-loss perspective","volume":"30","year":"2013","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2021041507292711900_ref043","doi-asserted-by":"crossref","first-page":"527","DOI":"10.2307\/256591","article-title":"Justice as a mediator of the relationship between methods of monitoring and organizational citizenship behavior","volume":"36","year":"1993","journal-title":"Academy of Management Journal"},{"issue":"1","key":"key2021041507292711900_ref044","doi-asserted-by":"crossref","first-page":"145","DOI":"10.5465\/amr.1991.4279002","article-title":"Strategic responses to institutional processes","volume":"16","year":"1991","journal-title":"Academy of Management Review"},{"issue":"9","key":"key2021041507292711900_ref045","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1287\/mnsc.25.9.833","article-title":"A conceptual framework for the design of organizational control mechanisms","volume":"25","year":"1979","journal-title":"Management Science"},{"issue":"4","key":"key2021041507292711900_ref046","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2753\/MIS0742-1222230402","article-title":"Host country resource availability and information system control mechanisms in multinational corporations: an empirical test of resource dependency theory","volume":"23","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2021041507292711900_ref047","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jgim.2012100101","article-title":"The amount of control in offshore software development projects","volume":"20","year":"2012","journal-title":"Journal of Global Information Management"},{"key":"key2021041507292711900_ref048","first-page":"1","article-title":"Why do you control? The concept of control purpose and its implications for IS project control research","year":"2015"},{"issue":"4","key":"key2021041507292711900_ref049","doi-asserted-by":"crossref","first-page":"298","DOI":"10.2307\/2787130","article-title":"Legitimacy, compliance, and gender in peer groups","volume":"58","year":"1995","journal-title":"Social Psychology Quarterly"},{"issue":"2","key":"key2021041507292711900_ref050","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1287\/isre.1080.0169","article-title":"Predictors of formal control usage in IT outsourcing partnerships","volume":"19","year":"2008","journal-title":"Information Systems Research"},{"issue":"2","key":"key2021041507292711900_ref051","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1111\/j.1540-5915.2000.tb01628.x","article-title":"An integrative framework of the information systems development process","volume":"31","year":"2000","journal-title":"Decision Sciences"},{"issue":"1","key":"key2021041507292711900_ref052","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/216504.216508","article-title":"Perceptions of control during systems development: effects on job satisfaction of systems professionals","volume":"16","year":"1995","journal-title":"Computer Personnel"},{"issue":"4","key":"key2021041507292711900_ref053","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1111\/j.1530-9134.2011.00315.x","article-title":"Legitimacy of control","volume":"20","year":"2011","journal-title":"Journal of Economics and Management Strategy"},{"issue":"4","key":"key2021041507292711900_ref054","doi-asserted-by":"crossref","first-page":"493","DOI":"10.2307\/2392880","article-title":"The adolescence of institutional theory","volume":"32","year":"1987","journal-title":"Administrative Science Quarterly"},{"key":"key2021041507292711900_ref055","volume-title":"Leadership in Administration","year":"1957"},{"issue":"1","key":"key2021041507292711900_ref056","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1057\/jit.2010.13","article-title":"Managing diverse stakeholders in enterprise systems projects: a control portfolio approach","volume":"26","year":"2011","journal-title":"Journal of Information Technology"},{"issue":"7","key":"key2021041507292711900_ref057","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.im.2011.07.002","article-title":"Out of fear or desire? Toward a better understanding of employees\u2019 motivation to follow IS security policies","volume":"48","year":"2011","journal-title":"Information & Management"},{"issue":"1","key":"key2021041507292711900_ref058","doi-asserted-by":"crossref","first-page":"115","DOI":"10.2753\/MIS0742-1222290104","article-title":"Contract performance in offshore systems development: role of control mechanisms","volume":"29","year":"2012","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2021041507292711900_ref059","doi-asserted-by":"crossref","first-page":"571","DOI":"10.5465\/amr.1995.9508080331","article-title":"Managing legitimacy: strategic and institutional approaches","volume":"20","year":"1995","journal-title":"Academy of Management Review"},{"issue":"1","key":"key2021041507292711900_ref060","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222240101","article-title":"Fact or fiction? A sensemaking perspective on the reality behind executives\u2019 perceptions of IT business value","volume":"24","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2021041507292711900_ref061","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1080\/07421222.2000.11518269","article-title":"Executives\u2019 perceptions of the business value of information technology: a process-oriented approach","volume":"16","year":"2000","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2021041507292711900_ref062","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/S1471-7727(01)00014-8","article-title":"Rules of the game: constructing norms of influence, subordination and constraint in IT planning","volume":"12","year":"2002","journal-title":"Information and Organization"},{"issue":"2","key":"key2021041507292711900_ref063","doi-asserted-by":"crossref","first-page":"87","DOI":"10.2753\/MIS0742-1222270203","article-title":"Systems development ambidexterity: explaining the complementary and substitutive roles of formal and informal controls","volume":"27","year":"2010","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"key2021041507292711900_ref064","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1002\/smj.623","article-title":"Does peripheral knowledge complement control? An empirical test in technology outsourcing alliances","volume":"28","year":"2007","journal-title":"Strategic Management Journal"},{"issue":"3","key":"key2021041507292711900_ref065","doi-asserted-by":"crossref","first-page":"9","DOI":"10.2753\/MIS0742-1222260301","article-title":"Control in internal and outsourced software projects","volume":"26","year":"2009","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"key2021041507292711900_ref066","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1108\/09593840810860333","article-title":"Between control and drift: negotiating improvement in a small software firm","volume":"21","year":"2008","journal-title":"Information Technology & People"},{"issue":"1","key":"key2021041507292711900_ref067","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1146\/annurev.psych.57.102904.190038","article-title":"Psychological perspectives on legitimacy and legitimation","volume":"57","year":"2006","journal-title":"Annual Review of Psychology"},{"issue":"3","key":"key2021041507292711900_ref068","doi-asserted-by":"crossref","first-page":"741","DOI":"10.25300\/MISQ\/2016\/40.3.11","article-title":"Control configuration and control enactment in information systems projects: review and expanded theoretical framework","volume":"40","year":"2016","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2021041507292711900_ref069","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.infoandorg.2009.06.001","article-title":"A field study of corporate employee monitoring: attitudes, absenteeism, and the moderating influences of procedural justice perceptions","volume":"19","year":"2009","journal-title":"Information and Organization"},{"key":"key2021041507292711900_ref300","year":"2009","journal-title":"Case Study Research: Design and Methods"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-11-2016-0275\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-11-2016-0275\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:55:54Z","timestamp":1753394154000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/31\/3\/712-740\/180097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,4]]},"references-count":70,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,5,4]]},"published-print":{"date-parts":[[2018,5,23]]}},"alternative-id":["10.1108\/ITP-11-2016-0275"],"URL":"https:\/\/doi.org\/10.1108\/itp-11-2016-0275","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2018,5,4]]}}}