Skip to main content

Understanding individual user resistance and workarounds of enterprise social networks: the case of Service Ltd

Abstract

The purpose of this study is to explore the use of Enterprise Social Networks (ESN), namely, Yammer and Chatter, using the lens of resistance and deployment of workarounds among individuals employed in a large, service sector organization. By doing so, we can illustrate the motivation behind individual use of ESN within a large organization, the reasons for not using it and the outcomes of their choices on the organization’s performance and day-to-day activities. The research approach of our study involves employing a qualitative approach and adopting the interpretive research perspective. Our findings illustrate that there are several bottom-up and top-down pressures, which effectively hinder the adequate or successful use of ESN and drive user resistance and workarounds. The contributions of our study are manifold. First, since ESN are actively considered by organizations, our findings can inform policymakers on the issues that might arise beyond implementation, more so, during the actual use of the system. In other words, the results of this research can shed light on the areas where their efforts are best placed. At a theoretical level, our study enriches the extant literature associated with adoption issues, by explaining that ESN involve multi-level organizational characteristics found within a specific context of use, that of ESN.

This is a preview of subscription content, access via your institution.

Figure 1:
Figure 2:
Figure 3:

References

  • Alter, S. (2014). Theory of Workarounds, Communications of the Association for Information Systems 34 (1): 1041–1066.

    Google Scholar 

  • Alvarez, R. (2008). Examining Technology, Structure and Identity During an Enterprise System Implementation, Information Systems Journal 18 (2): 203–224.

    Article  Google Scholar 

  • Azad, B. and King, N. (2011). Institutionalized Computer Workaround Practices in a Mediterranean Country: An examination of two organizations, European Journal of Information Systems 21 (4): 358–372.

    Article  Google Scholar 

  • Bain, P. and Taylor, P. (2000). Entrapped by The ‘Electronic Panopticon’? Worker resistance in the call centre, New Technology, Work and Employment 15 (1): 2–18.

    Article  Google Scholar 

  • Benbasat, I. and Barki, H. (2007). Quo Vardis TAM? Journal of the Associaiton of Informaiton Systems 8 (4): 212–218.

    Google Scholar 

  • Benbasat, I. and Barki, H. (2009). Quo vadis, TAM? Journal of the Association for Information System 8 (3): 211–218.

    Google Scholar 

  • Benbya, H. and McKelvey, B. (2006). Using Coevolutionary and Complexity Theories to Improve IS Alignment: A multi-level approach, Journal of Information Technology 21 (4): 284–298.

    Article  Google Scholar 

  • Borgatti, S.P. and Cross, R. (2003). A Relational View of Information Seeking and Learning in Social Networks, Management Science 49 (4): 432–445.

    Article  Google Scholar 

  • Boudreau, M.-C. and Robey, D. (2005). Enacting Integrated Information Technology: A human agency perspective, Organization Science 16 (1): 3–18.

    Article  Google Scholar 

  • Button, G., Mason, D. and Sharrock, W. (2003). Disempowerment and Resistance in the Print Industry? Reactions to Surveillance-Capable Technology, New Technology, Work and Employment 18 (1): 50–61.

    Article  Google Scholar 

  • Callaghan, G. and Thompson, P. (2001). Edwards Revisited: Technical central and call centres, Economic and Industrial Democracy 22 (1): 13–37.

    Article  Google Scholar 

  • Ciborra, C.U. (2002). The Labyrinths of Information: Challenging the wisdom of systems, Oxford: Oxford University Press.

    Google Scholar 

  • Davis, F.D. (1980). A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and results, Cambridge, MA: Massachusetts Institute of Technology.

    Google Scholar 

  • Davis, F.D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly 13 (3): 319–340.

    Article  Google Scholar 

  • Eisenhardt, K.M. (1989). Buiding Theories from Case Study Research, Academy of Management Review 14 (4): 532–550.

    Google Scholar 

  • Ferneley, E.H. and Sobreperez, P. (2006). Resist, Comply or Workaround? An Examination of Different Facets of User Engagement with Information Systems, European Journal of Information Systems 15 (4): 345–356.

    Article  Google Scholar 

  • Fernie, S. and Metcalf, D. (1998). (Not) Hanging on the Telephone: Payment system in the new sweatshops. Centre for Economic Performance. London, UK: London School of Economics.

    Google Scholar 

  • Folger, R. and Skarlicki, D.P. (1999). Unfairness and Resistance to Change: Hardship as mistreatment, Journal of Organizaitonal Change Management 12 (1): 35–50.

    Article  Google Scholar 

  • Franz, C.R. and Robey, R. (1984). An Investigation of User-Led System Design: Rational and Political Perspectives, Communications of the ACM 27 (12): 1202–1209.

    Article  Google Scholar 

  • Geertz, C. (1973). The Interpretation of Cultures: Selected essays, New York: Basic Books.

    Google Scholar 

  • Ginzberg, M.J. (1981). Early Diagnosis of MIS Imple-mentation Failure: Promising results and unanswered questions, Management Science 27 (4): 459–478.

    Article  Google Scholar 

  • Glaser, B.G. and Strauss, A.L. (1967). The Discovery of Grounded Theory: Strategies for Qualitative Research, Chicago, IL: Aldine Publishing.

    Google Scholar 

  • Greenwood, R. and Hinings, C.R. (1996). Understanding Radical Organizational Change: Bringing together the old and the new institutionalism, The Academy of Management Review 21 (4): 1022–1054.

    Google Scholar 

  • Griffith, T.L. (1999). Technology Features as Triggers for Sensemaking, Academy of Management Review 24 (3): 472–488.

    Google Scholar 

  • Hirschheim, R. and Klein, H.K. (1994). Realizing Emancipatory Principles in Information Systems Development: The case for ETHICS, MIS Quarterly 18 (1): 83–109.

    Article  Google Scholar 

  • Howard, P.N. (2002). Network Ethnography and the Hypermedia Organization: New media, new organizations, new methods, New Media & Society 4 (4): 550.

    Article  Google Scholar 

  • Huuskonen, S. and Vakkari, P. (2013). ‘I Did It My Way’: Social workers as secondary designers of a client information system, Information Processing & Management 49 (1): 380–391.

    Article  Google Scholar 

  • Jarvenpaa, S.L. and Majchrzak, A. (2008). Knowledge Collaboration Among Professionals Protecting National Security: Role of transactive memories in ego-centered knowledge networks, Organization Science 19 (2): 260–276.

    Article  Google Scholar 

  • Jermier, J.M., Knights, D. and Nord, W. (eds.) (1994). Resistance and Power in Organizations, London: Routledge.

    Google Scholar 

  • Joshi, K. (1991). A Model of Users’ Perspective on Change: The case of information systems technology implementation, MIS Quarterly 15 (2): 229–242.

    Article  Google Scholar 

  • Kane, G.C., Alavi, M., Labianca, G.J. and Borgatti, S. (2014). What’s Different About Social Media Networks? A Framework and Research Agenda, MIS Quarterly 38 (1): 275–304.

    Google Scholar 

  • Kaplan, A.M. and Haenlein, M. (2010). Users of The World, Unite! The Challenges and Opportunities of Social Media, Business Horizons 53: 59–68.

    Article  Google Scholar 

  • Keen, P.G.W. (1981). Information Systems and Organizational Change, Communications of the ACM 24 (1): 24–33.

    Article  Google Scholar 

  • Kobayashami, I.M., Fussell, S.R., Xiao, Y. and Seagull, F.J. (2005). Work Coordination, Workflow and Workarounds in a Medical Context, in CHI ‘05 Extended Abstracts on Human Factors in Computing Systems. Conference on Human Factors in Computing Systems: Portland, USA, pp. 1561–1564.

  • Koch, H., Gonzalez, E. and Leidner, D. (2012). Bridging the Work/Social Divide: The emotional response to organizational social networking sites, European Journal of Information Systems 21 (6): 699–717.

    Article  Google Scholar 

  • Lankshear, G. and Mason, D. (2001). Technology and Ethical Dilemmas in a Medical Setting: Privacy, professional autonomy, life and death, Ethics and Information Technology 3 (3): 223–233.

    Article  Google Scholar 

  • Lankshear, G., Cook., P., Mason, D. and Coates, S. (2001). Call Centre Employees Responses to Electronic Monitoring: Some research findings, Work, Employment & Society 15 (3): 595–605.

    Article  Google Scholar 

  • Lapointe, L. and Beaudry, A. (2014). Identifying IT User Mindsets: Acceptance, resistance and ambivalence, in 47th Hawaii International Conference on System Sciences (HICSS 47), Hawaii, pp. 4619–4628.

  • Lapointe, L. and Rivard, S. (2005). A Multilevel Model of Resistance to Information Technology Implementation, MIS Quarterly 29 (3): 461–491.

    Google Scholar 

  • Laumer, S. and Eckhardt, A. (2012). Why Do People Reject Technologies: A review of user resistance theories, in Y.K. Dwivedi, M.R. Wade and S.L. Schneberger (eds.) Information Systems Theory. Vol. 28, New York: Springer, pp. 63–86.

    Chapter  Google Scholar 

  • Leonardi, P. and Barley, S. (2010). What’s under Construction Here? Social Action, Materiality, and Power in Constructivist Studies of Technology and Organizing, The Academy of Management Annals 4 (3): 1–51.

    Article  Google Scholar 

  • Leonardi, P.M., Huysman, M. and Steinfield, C. (2013). Enterprise Social Media: Defintion, history and prospects for the study of social technologies in organizations, Journal of Computer Mediated Communication 19: 1–19.

    Article  Google Scholar 

  • Marakas, G. and Hornik, S. (1996). Passive Resistance Misuse: Overt support and covert recalcitrance in IS implementation, European Journal of Information Systems 5: 208–219.

    Article  Google Scholar 

  • Markus, M.L. (1983). Power, Politics, and MIS Implementation, Communications of the ACM 26 (6): 430–444.

    Article  Google Scholar 

  • Meyer, J.W. and Rowan, B. (1977). Institutionalized Organizations: Formal structure as myth and ceremony, American Journal of Sociology 83 (2): 340–363.

    Article  Google Scholar 

  • Moore, G.C. and Benbasat, I. (1996). Integrating Diffusion of Innovations and Theory of Reasoned Action Models to Predict Utilization of Information Technology by End-Users, in K. Kautz and J. Pries-Hege (eds.) Diffusion and Adoption of Information Technology, London: Chapman and Hall, pp. 132–146.

    Chapter  Google Scholar 

  • Oinas-Kukkonen, H., Lyytinen, K. and Yoo, Y. (2010). Social Networks and Information Systems: Ongoing and future research streams, Journal of the Associaiton of Informaiton Systems 11 (2): 61–68.

    Google Scholar 

  • Orlikowski, W.J. and Baroudi, J.J. (1991). Studying Information Technology in Organizations: Research approaches and assumptions, Information Systems Research 2 (1): 1–28.

    Article  Google Scholar 

  • Orlikowski, W.J. (1992). The Duality of Technology: Rethinking the concept of technology in organizations, Organization Science 3 (3): 398–427.

    Article  Google Scholar 

  • Orlikowski, W.J. (1993). CASE Tools as Organizational Change: Investigating incremental and radical changes in systems development, MIS Quarterly 17 (3): 3309–3340.

    Article  Google Scholar 

  • Orlikowski, W.J. (2000). Using Technology and Constituting Structures: A practice lens for studying technology in organizations, Organization Science 11 (4): 404–428.

    Article  Google Scholar 

  • Orr, J.E. (1996). Talking about Machines: An ethnography of a modern job, Ithaca, NY: ILR Press/Cornell University Press.

    Google Scholar 

  • Orton, J.D. and Weick, K.E. (1990). Loosely Coupled Systems: A reconceptualization, Academy of Management Review 15 (2): 203–223.

    Google Scholar 

  • Pentland, B.T. and Feldman, M.S. (2008). Designing Routines: On the folly of designing artifacts, while hoping for patterns of action, Information and Organization 18 (4): 235–250.

    Article  Google Scholar 

  • Petrides, L.A., McClelland, S.I. and Nodine, T.R. (2004). Costs and Benefits of the Workaround: Incentive, solution or costly alternative, International Journal of Educational Management 18 (2): 100–108.

    Google Scholar 

  • Piskorski, M.J. (2011). Social Strategies that Work, Harvard Business Review 89 (11): 116–122.

    Google Scholar 

  • Prasad, P. and Prasad, A. (2000). Stretching the Iron Cage: The constitution and implications of routine workplace resistance, Organization Science 11 (4): 387–403.

    Article  Google Scholar 

  • Ren, Y., Carley, K. and Argote, L. (2006). The Contingent Effects of Transactive Memory: When is it more beneficial to know what others know?, Management Science 52 (5): 671.

    Article  Google Scholar 

  • Riemer, K., Diederich, S., Richter, A. and Scifleet, P. (2011). Tweet Talking – Exploring The Nature of Microblogging at Capgemini Yammer. Business Information Systems Working Paper Series, University of Sydney, Sydney, Australia.

  • Riemer, K., Overfeld, P., Scifleet, P. and Richter, A. (2012). Eliciting the Anatomy of Technology Appropriation Processes: A Case Study in Enterprise Social Media, in European Conference on Information Systems (ECIS 2012), Barcelona, Spain.

  • Rosenthal, P. (2004). Management Control as an Employee Resource: The case of front line service workers, Journal of Mangement Studies 41 (4): 601–622.

    Article  Google Scholar 

  • Schwarz, A., Chin, W.W., Hirschheim, R. and Schwarz, C. (2014). Toward a Process based View of Information Technology Acceptance, Journal of Information Technology 29 (1): 73–96.

    Article  Google Scholar 

  • Selander, L. and Henfridsson, O. (2012). Cynicism as User Resistance in IT Implementation, Information Systems Journal 22 (4): 289–312.

    Article  Google Scholar 

  • Selznick, P. (1957). Leadership in Administration, New York: Harper and Row.

    Google Scholar 

  • Sewell, G. and Wilkinson, B. (1992). Someone to Watch over the Surveillance, Discipline and Just-in-Time Labour Process, Sociology 26 (2): 271–289.

    Article  Google Scholar 

  • Suchman, L. (1987). Plans and Situated Actions: The problem of human-machine communication, New York, NY: Cambridge University Press.

    Google Scholar 

  • Szulanski, G. (1996). Exploring Internal Stickiness: Impediments to the transfer of best practice within the firm, Strategic Management Journal 17 (S2): 27–43.

    Article  Google Scholar 

  • Timmons, S. (2003). Nurses Resisting Information Technology, Nursing Inquiry 10 (4): 257–269.

    Article  Google Scholar 

  • Treem, J.W. and Leonardi, P.M. (2012). Social Media Use in Organizations: Exploring the affordances of visibility, editability, persistence, and association, Communication Yearbook 36: 143–189.

    Google Scholar 

  • Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003). User Acceptance of Information Technology: Towards a unified view, MIS Quarterly 27 (3): 425–478.

    Google Scholar 

  • Walsham, G. (1995). Interpretive Case Studies in IS Research: Nature and method, European Journal of Information Systems 4 (2): 74–81.

    Article  Google Scholar 

  • Walsham, G. (2006). Doing Interpretive Research, European Journal of Information Systems 15 (3): 320–330.

    Article  Google Scholar 

  • Webb, M. and Palmer, G. (1998). Evading Surveillance and Making Time: An ethnographic view of the Japanese factory floor in Britain, British Journal of Industrial Relations 36 (4): 611–627.

    Article  Google Scholar 

  • Wu, L. (2013). Social Network Effects on Productivity and Job Security: Evidence from the adoption of a social networking tool, Information Systems Research 24 (1): 30–51.

    Article  Google Scholar 

  • Yammer (2014). Guide to events. 25 October, [WWW document] https://about.yammer.com/success/wp-content/uploads/sites/13/Guide-to-Events_en_US.pdf (accessed 4 January 2014).

Download references

Acknowledgements

The principal author thanks the Royal Academy of Engineering, A. Jones, M.A. Stewart, B. Krepel and University of Hertfordshire for the funding, access to Service Ltd and time afforded to this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jyoti Choudrie.

Appendix A

Appendix A

Background to yammer and chatter

Background to yammer

Yammer is a private and secure online environment that supports real-time communication, collaboration and sharing within enterprises. Simply stated, it is a social network for businesses and companies, and is provided by Microsoft. Service Ltd has almost 24,000 users from within its 140,000 global workforce. Access to a Yammer network is determined by a user’s Internet domain so that only individuals with appropriate e-mail addresses may join their respective networks. From the interviews it was learnt that updates are sent on a daily basis to the users, and in the late mornings. Users then decide what is of interest to them and what is not. Some appreciated this practice but others did not like it. A business consultant mentioned that updates are about individuals leaving and arriving, and disliked this particular feature: ‘I find information on people leaving and coming in to the company as a waste of time’. In Yammer, some individuals also posted their personal hobbies and interests, as for example, recipes, or the latest gadgets and had discussions on them. One commercial bids manager mentioned that ‘It is really nice that we can ask someone at work about a recipe, or the latest i-phone rather than asking someone else’, while an IT manager found it interesting: ‘I like the quote of the day, or small information on Yammer’.

Figure A1 informs readers on Yammer’s structure and its interface.

Figure A1
figure 4

Yammer screen shot (Yammer, 2014).

Implementing Yammer

Service Ltd’s Yammer network was launched in 2008 shortly after the inauguration of Yammer in the United States. It emerged after some individuals attended an Information Technology conference where a freeware known as Yammer was mentioned. This encouraged three engineers to begin posting on Yammer and encouraging growth. The network was very quiet for 2 years. As the Yammer champion said, ‘1000 people joined, but the three folks posted consistently – maybe once or twice a week each’. Then, in March 2010 there was a push towards growth where word-of-mouth and a single e-mail were used to encourage users. This led to the network peaking to hit critical mass. In January 2011, Service Ltd signed a contract and before the agreement it was found that there were around 3000 users. In 2011 February, Service Ltd merged with another American organization that had 5000 users, which led to a growth in the number of users in Service Ltd to approximately 8000. The network grew rapidly over the next year or two, thanks to a better understanding of the usage process, and then growth levelled. It has been just under 25,000 for some time now (at least 1.5 years). When reasons for the flat line were explored, several theories had been suggested. The first one was that there were limited resources invested into further development of Yammer. Second, despite all the promotions and initiatives that were undertaken, it appeared that the saturation or mature point had been reached. Therefore, further efforts appeared not to be achieving any outcomes. Third, the organization formed better processes to remove duplicate users. This better understanding of the processes led to the removal of multiple accounts, or of accounts of users who had left the organization, that is, whose employment contracts ceased to exist. If this had been pursued from the start of the implementation period, then there might be even less registered Yammer users. As the Corporate Communications Manager, who is also the Yammer champion said: ‘It was us poking into Yammer’s process for validating and getting rid of users who had left the company or who had more than one e-mail account. So Yammer keeps your user ID off your e-mail account. So if you have multiple accounts, you could accidentally or purposely set up a multiple Yammer profile. But we have, through our I.D. system, identified only one e-mail that would then get into the system. Therefore, you would be signing in with your Service Ltd ID rather than your e-mail account’.

As far as the champion of Yammer knew, there was no top-level (senior management) support, but approval for implementing Yammer did exist. Hence, there were no barriers that prevented the development and implementation of Yammer. In addition, as the champion commented, there was no strong campaign pursued, or senior management saying ‘Everybody needs to use Yammer’.

In Service Ltd (UK) the Corporate Communications Manager recalled, ‘When Yammer first came out, there was a pretty decent promotion about it. So there was some information about the processes to follow for using Yammer’. Further, there was no synchronous plan that the organization was pursuing to diffuse and develop Yammer any further. In other words, there was no concerted effort or campaign being pursued. Nevertheless, there is a corporate policy about using Yammer. As the champion of Yammer stated, ‘So we do have a corporate policy governing about what you can say, or cannot say on Yammer. Here’s what you do if something goes wrong and all of that’.

Background to Chatter

Chatter is provided by Salesforce as a secure enterprise collaboration application and social development platform. The unique selling point that Salesforce emphasizes is that Chatter allows organizations to collaborate in real time within a secure, private social network for their business. Further, it provides developers with the opportunity to use the Salesforce Chatter platform (www.salesforce.com/chatter/platform) to build social enterprise applications, with all 135,000 native Salesforce applications instantly becoming social. Having achieved immense success in the cloud computing arena, Chatter is the next major innovative initiative for Salesforce.com. To access Chatter, a salesfigure.com account is needed, which is provided only to the employees of the organization and is not available to every member of the public. An example of a Chatter webpage is provided in Figure A2.

Figure A2
figure 5

A screen shot of chatter’s page (Source: Salesforce.com).

As shown in Figure A1 and Figure A2, the appearance of both ESN is quite similar to that of Facebook. As the Marketing Manager for Europe, who is also the Chatter champion, commented: ‘Chatter is a Facebook for the organization’.

Implementing Chatter

Comparatively, Service Ltd’s Chatter system is in its early stages as implementation took place in May 2014. To date, there are less than 1100 users in Europe and approximately 2000 globally. This shows that presently, compared with Yammer, there appears to be a larger social system user database. In what follows, we describe the background to Chatter’s implementation.

Salesforce was using Salesforce.com as a tool for their communication and their sales process, that is, as a Customer Relationship Management system for reporting the organization’s sales activity. In simple terms, as described by the Marketing Manager for Service Ltd (Europe), who is the Chatter, champion, ‘In lay man’s terms, Chatter is a social media Facebook of Salesforce that has the capability to have conversations with the other users of Service Ltd. It also discusses updates, opportunities and account contacts among the many other features of Salesforce’.

In Service Ltd, many of the sales people felt there was support for the ESN use as they were already using Salesforce.com every day. In the mean time, there was a huge drive within Salesforce to tear communication down to one tool, as there was a lot of frustration because of the many available tools. For example, one individual exclaimed his frustration by wondering ‘What tool do I use, how do I log in?’ To ensure some streamlining and to reduce, or eliminate the frustration, Chatter was enabled to an existing Salesforce.com group, that is, largely the Sales and Marketing departments. To implement Chatter, it was decided that all user groups would have the same capabilities. Therefore, some groups that did not enjoy the same features as the other Chatter users were provided with similar ones. This ensured uniformity. As a developer team member (also an Internal Communications Manager for United States) said: ‘There were different business groups – some who were more excited about Chatter and wanted Chatter to be enabled right away, but there were others with a wait and see attitude. So, it was decided that all the user groups would have the features and then, Chatter would be enabled’. The European champion spoke of how Chatter was implemented globally with champions around the globe: ‘Initially there were project managers who were co-ordinating the efforts’. Europe’s deployment strategies have been successful and their efforts were used as the benchmark. Some quick guides or 1 min tutorials were also used in Europe. These were drawn primarily from YouTube videos developed by Salesforce or from homemade videos with screen captures in them. These videos provided information on functionality, how to post an image, or how to interact with groups.

Another pursued strategy was to inform the senior management on Chatter’s capabilities as a social media channel for the organization. This involved the provision of a 15 min presentation to Country Managers and General Managers in Western Europe. As the Chatter champion said, ‘In the presentation, the importance of Chatter was also emphasized. This included: Chatter will allow communication. It will allow direct engagement. So you can have central management engaging directly with the field agents. There will be no need to use e-mail or other such channels. It is short and to the point as there is a limit the text to 140 characters. Finally, it is a hub to the organization’s business activity. Second. Chatter allows recognition: “If someone has signed off a contract, then senior management can take an instant action using Chatter. You know, to say congratulations, great job, and great win”. The Account Manager gets acknowledged as well. Therefore, the peers will see the recognition and acknowledgement and gives them encouragement. This helps with sales competitiveness. Finally, Chatter helps with collaboration. It enables virtual teams to work together, creates groups and allows content to be uploaded to those groups’.

The US strategies were more conservative. Some Salesforce information on Chatter usage, some quick guides and thorough tutorials, configured education courses and planned out education courses for their staff members were employed. Information for Senior Managers was not diffused, as it was believed that the inertia, or demand from individuals would drive the provision of Chatter.

Rights and permissions

Reprints and Permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choudrie, J., Zamani, E. Understanding individual user resistance and workarounds of enterprise social networks: the case of Service Ltd. J Inf Technol 31, 130–151 (2016). https://doi.org/10.1057/jit.2016.9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/jit.2016.9

Keywords