The recent abandonment of a multi-billion dollar project in the UK to computerize health recordsFootnote 1 provides testimony that knowledge accumulated in the MIS field has failed to impact successfully on policy and practice. The larger the scale of such IS implementations, the higher, it appears, is the risk. Implementation of organisation wide systems (for example, ERP), automated supply chain management enabled by Inter-organisational systems (IOS), emerging technologies (such as Cloud computing) add further complexity both at the project and system level, thereby augmenting the risk of failure. Other recent examples of major failure in both public and private sector include: Sainsbury’s failed automated logistics system,Footnote 2 the much-publicised software problems of the Toyota Prius,Footnote 3 and the UK Government’s abandonment of national ID cards.Footnote 4 Technology enabled global practices (such as outsourcing) have also fundamentally changed the way that IS/IT is developed. Such practices have advantages but in themselves bring new risks, which can lead to failure, causing significant economic loss to the organisations.

Such high profile failures show that, despite decades of research and the accumulation of a substantial knowledge-base within MIS (see for example, Avison and Wilson 2002; Barker and Frolick 2003; Beynon-Davies 1995;1996; Bussen and Myers 1997; Cerpa and Verner 2009; Dwivedi et al. 2013a; Fitzgerald and Russo 2005; Heeks 2002; Kappelman et al. 2006; Lyytinen and Hirschheim 1988; McMaster and Wastell 2004; Nelson 2007; Sauer 1993; Yeo 2002), further progress is required to improve the conduct of information systems initiatives. Faced with this, it is pertinent to ask why our scholarship has not been more effective. Is the fault one of theory and inadequate understanding? Or is the problem one of knowledge transfer, the failure to embed research knowledge in the working practices of managers and policy-makers. This special issue aims to move forward our understanding of the success and failure of information and communication technology-based innovation, and on the factors influencing the uptake of research knowledge in the practitioner community. The accepted papers are briefly summarised below.

Janssen et al.’s article (Failure of Large Transformation Projects from the Viewpoint of Complex Adaptive Systems: Management Principles for Dealing with Project Dynamics) adopted a complex adaptive system (CAS) in order to understand better project dynamics and identify management principles for dealing with them. A case study of a large transformation project in the Netherlands was carried out, in which seven patterns were found through which project dynamics could be identified. A logical consequence of the immense complexity of the case study was that stakeholders lost sight of the overall goals, and instead focused on managing short-term incidents and approached the project in an ad hoc way. Informed by CAS theory, this study presented eight management principles that address the complexities of this type of project and can aid in coping with project dynamics (Janssen et al. 2015).

The article by Rao and De’ entitled Technology assimilation through conjunctures - a look at IS use in retail attempted to examine the assimilation of IT by an organization establishing itself in the emerging Indian retail industry. The study applied strong structuration theory, which is a refinement of Giddens’ structuration theory, as the theoretical lens for studying the technology assimilation process. This was integrated with elements from actor network theory to incorporate socio-technical perspectives. The study analysed the assimilation process as a series of conjunctures, and illustrates how socio-technical changes, situated actions and the conjuncture’s context influence the assimilation process (Rao and De’ 2015).

Bunker et al.’s article (Repertoires of Collaboration for Common Operating Pictures of Disasters and Extreme Events) argued that disasters are dynamic, emergent scenarios involving diverse stakeholders in complex decision making and as such, disaster response systems must account for these conditions. The study suggested that emergency service agencies should consider supplementing their traditional command and control approaches and common operating pictures (COP), with purposeful collaborative approaches. This research utilized McCann’s model of Social Problem Solving Negotiated Arrangements (SPS-NA) to highlight problems with conventional approaches during three disaster scenarios. Based on data-sources from three internationally well-known large-scale disasters the authors analyse the strength of the framework. As a result of lessons learned, the study recommends that developing supplementary repertoires of collaboration would have a positive impact on improved COP for effective disaster response outcomes (Bunker et al. 2015).

Madsen et al.’s article (Knowledge Transfer Planning and Execution in Offshore Outsourcing: An Applied Approach) reported a longitudinal project about knowledge transfer conducted in a major financial company headquartered in Denmark and an offshore development center located in Bangalore, India. The study identified the main knowledge transfer challenges experienced by the case company, which informed the conceptual design of a systematic five-step approach to the company’s knowledge transfer. The study drew attention to the fact that client side managers play a crucial role in determining how, and with what priority, knowledge transfer can take place. This article also suggests that a first, important step towards ensuring successful knowledge transfer in outsourcing is to focus on the training and support of client side managers (Madsen et al. 2015).

Brooks and Alam’s paper Designing an information system for updating land records in Bangladesh, reflects on applying Action Design Research (ADR) in a complex organizational context in a developing country. The study showed that ADR requires additional theory for designing IS in such a complex organizational context. Through conducting ADR, it is seen that an ethnographic framework has potential complementarities for understanding complex contexts thereby enhancing the ADR process. This paper argued that conducting ADR with an ethnographic approach enhances the design of IS. This paper aimed also to present a broader methodological framework, Action Design Ethnographic Research (ADER), for designing artefacts as well as IS, which is illustrated through the case of a land records updating service in Bangladesh (Brooks and Alam 2015).

Elbanna and Linderoth’s contribution focused on The Formation of Technology Mental Models in Voluntary Use Organizational Settings. This study questions why and how users choose to engage (or not) with open technology on a voluntary basis and how and why its use options and potential unfold? The study examined a longitudinal case study (1994–2012) on the voluntary use of telemedicine. The findings revealed that users’ perception of open technology in a voluntary setting is formed through a continuous interplay between users’ mental models of technology, professional identity, institutional traditions and arrangements and work practices. If contradictions arise in this interplay, users’ mental models can be fixated on the misfit, and the misfit is thereby reinforced. Hence, users do not try to develop use-cases or think of possible applications. However, institutional entrepreneurs could break this self-fulfilling prophecy by influencing both the mental models of users and the institutional arrangements (Elbanna and Linderoth 2015).

Hossain and Quaddus (Developing and validating a hierarchical model of external responsiveness: A study on RFID technology) employed both qualitative and quantitative approaches to develop and validate a multi-dimensional hierarchical model of external responsiveness and its effect on adoption intention. The findings of the study show that in the context of Radio Frequency Identification (RFID) technology, external responsiveness is a third-order, reflective construct which is influenced by external pressure (government pressure, market pressure, mimetic pressure, and normative pressure), external support (government support, vendor support, and associative support), and external uncertainty (market and technology uncertainty). Moreover, the impact of the third-order and second-order constructs on the intention to adopt RFID is examined, and found to have positive influences (Hossain and Quaddus 2015).

Rana et al. examined the success of an online public grievance redress system (OPGRS) from the perspective of the citizens of India. The success of this e-government system is examined using an integrated IS success model, which was validated using the response collected from 419 citizens from different cities of India. The empirical outcomes provided support for the hypothesised relationships between eight constructs (Rana et al. 2015).

In addition to regular submissions, a panel of IFIP 8.6 2013 participants were invited to develop a perspective-oriented and direction-setting paper on the theme of IS success and failure. This multi-authored paper by Dwivedi, Wastell, Laumer, Henriksen, Myers, Bunker, Elbanna, Ravishankar and Srivastava is entitled Research on Information Systems Failures and Successes: Status Update and Future Directions. The article produced by the Panel aimed to reflect on the need for new perspectives and research directions to provide insights and further guidance for managers on factors enabling IS success and for avoiding IS failure. Several key issues emerged, such as the need to study problems from multiple perspectives, to move beyond narrow considerations of the IT artifact, and to venture into underexplored organizational contexts, such as the public sector (Dwivedi et al. 2015).

This special issue has evolved from research presented during the 14th IFIP WG 8.6 ConferenceFootnote 5 which was hosted at the Indian Institute Management Bangalore, India in June 2013. The conference invited the following two types of submissions: full-length journal style papers and short papers, which could be research in progress or polemical “position papers”. The call for papers attracted 65 submissions, representing a broad international cross-section of authors. These submissions were reviewed rigorously by two independent reviewers which resulted in selection of the final set of 35 full papers that appeared in the blind peer-review conference proceedings. Accepted submissions were clustered into the following five categories. Ten accepted submissions addressed the conference theme of IS success/failure. Nine papers examined IT in the public sector, which was followed by a set of seven papers that addressed more general aspects of IS theory and methodology. Five studies focused on the adoption or acceptance of IT. Finally, software development related issues were addressed by four papers. Further detail about content of the conference proceedings can be found in Dwivedi et al. (2013b).

Eight papers (from the 35 conference articles) were selected for consideration for publication in this special issue of Information Systems Frontiers. The following guidelines were used for selection of these articles. We identified a set of papers with substantial empirical content and theoretical contribution that represented the range of issues bearing on the conference theme. The results of the peer-review process for the conference influenced our selection decisions, enabling the co-editors of this special issue individually to identify and rank a set of eight papers. The short-lists prepared by each co-editor were then correlated to identify eight papers that were ranked favourably by all four co-editors. Guest editors’ recommendations were then communicated to the chief editors of the journal. Initially, authors of shortlisted papers were provided with feedback outlining suggestions for improving and extending their papers. The revised and substantially extended versions were submitted online, and each submission went through three rounds of further reviews involving three reviewers each (Appendix).