Abstract
In this paper, we focus on a critical aspect of work in organizations: using information in work tasks which is provided by information systems (IS) such as enterprise content management (ECM) systems. Our study based on the IS success model, 34 interviews, and an empirical study of 247 ECM system users at a financial service provider indicates that it is appropriate to differentiate between contextual and representational information quality as two information quality dimensions. Furthermore, we reveal that in addition to system quality, the two information quality dimensions are important in determining end-user satisfaction, which in turn influences the manifestation of workarounds. Our study also finds that employees using workarounds to avoid an ECM system implemented several years is negatively related to individual net benefits of the ECM system. Hence, we conclude that when investigating large-scale IS such as ECM systems, it is important to differentiate among information quality dimensions to more deeply understand end-user satisfaction and the resulting manifestation of workarounds. Moreover, this research guides organizations in implementing the most appropriate countermeasures based on the importance of either contextual or representational information quality.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Alalwan JA (2012) Enterprise content management research: a comprehensive review. Journal of Enterprise Information Management 25(5), 441–461, doi: 10.1108/17410391211265133.
Alter S (2006) The work system method: connecting people, processes, and IT for business results. Work System Press.
Alter S (2013) Work system theory: overview of core concepts, extensions, and challenges for the future. Journal of the Association for Information Systems 14(2), 1.
Alter S (2014) Theory of workarounds. Communications of the Association for Information Systems 34(1), 55.
Ansari SM, Fiss PC and Zajac EJ (2010) Made to fit: How practices vary as they diffuse. Academy of Management Review 35(1), 67–92.
Ash JS, Berg M and Coiera E (2004) Some unintended consequences of information technology in health care: the nature of patient care information system-related errors. Journal of the American Medical Informatics Association 11(2), 104–112.
Azad B and King N (2008) Enacting computer workaround practices within a medication dispensing system. European Journal of Information Systems 17(3), 264–278, doi: 10.1057/ejis.2008.14.
Azad B and King N (2011) Institutionalized computer workaround practices in a Mediterranean country: an examination of two organizations. European Journal of Information Systems 21(4), 358–372, doi: 10.1057/ejis.2011.48.
Bagozzi RP (1979) The role of measurement in theory construction and hypothesis testing: toward a holistic model. Conceptual and theoretical developments in marketing 8, 15–32.
Baron RM and Kenny DA (1986) The moderator‐mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology 51(6), 1173.
Beath C, Becerra-Fernandez I, Ross J and Short J (2012) Finding value in the information explosion. MIT Sloan Management Review 53(4), 18.
Bhattacherjee A (2001) Understanding information systems continuance: an expectation-confirmation model. MIS Quarterly 25(3), 351–370.
Bhattacherjee A and Hikmet N (2007) Physicians’ resistance toward healthcare information technology: a theoretical model and empirical test. European Journal of Information Systems 16(6), 725–737.
Böhn M (2014) The market for ECM software. In Enterprise Content Management in Information Systems Research (Vom Brocke J and Simons A, Eds), pp. 23–36, Springer, Berlin.
Boudreau M-C and Robey D (2005) Enacting integrated information technology: a human agency perspective. Organization Science 16(1), 3–18.
Brazel JF and Dang L (2008) The effect of ERP system implementations on the management of earnings and earnings release dates. Journal of Information Systems 22(2), 1–21.
Brislin RW (1970) Back-translation for cross-cultural research. Journal of Cross-Cultural Psychology 1(3), 185–216, doi: 10.1177/135910457000100301.
Broadhurst K, Wastell D, White S, Hall C, Peckover S, Thompson K, Pithouse A and Davey D (2009) Performing ‘initial assessment’: identifying the latent conditions for error at the front-door of local authority children’s services. British journal of social work.
Campbell DT and Fiske DW (1959) Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin 56(2), 81–105, doi: 10.1037/h0046016.
Carmines EG and Zeller RA (1979) Reliability and Validity Assessment. Sage Publications, Beverly Hills, Calif.
Chang JC-J and King WR (2005) Measuring the Performance of Information Systems: A Functional Scorecard. Journal of Management Information Systems 22(1), 85.
Chin WW (1998a) Commentary: issues and opinion on structural equation modeling. MIS Quarterly 22(1), 7–16, doi: 10.2307/249674.
Chin WW (1998b) The partial least squares approach to structural equation modeling. In Modern Methods for Business Research (Marcoulides GA, Ed), pp. 295–336, Erlbaum, Mahwah, NJ.
Chin WW, Gopal A and Salisbury WD (1997) Advancing the Theory of adaptive structuration: the development of a scale to measure faithfulness of appropriation. Information Systems Research 8(4), 342–367, doi: 10.1287/isre.8.4.342.
Chin WW, Thatcher JB and Wright RT (2012) Assessing common method bias: problems with the ULMC technique. MIS Quarterly 36(3), 1003.
Cohen J (1988) Statistical Power Analysis for the Behavioral Sciences. L. Erlbaum Associates, Hillsdale, N.J.
Cvach M (2012) Monitor alarm fatigue: an integrative review. Biomedical Instrumentation & Technology 46(4), 268–277.
Davison RM and Ou CXJ (2013) Sharing knowledge in technology deficient environments: individual workarounds Amid corporate restrictions. Proceedings of the 2013 European Conference on Information Systems.
Delone W and Mclean E (1992) Information systems success: the quest for the dependent variable. Information Systems Research 3(1), 60–95, doi: 10.1287/isre.3.1.60.
Delone W and Mclean E (2003) The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems 19(4), 9–30.
Dwivedi YK, Wastell D, Laumer S, Henriksen HZ, Myers MD, Bunker D, Elbanna A, Ravishankar MN and Srivastava SC (2014) Research on information systems failures and successes: status update and future directions. Information Systems Frontiers, doi: 10.1007/s10796-014-9500-y.
Eckhardt A, Laumer S and Weitzel T (2009) Who influences whom? Analyzing workplace referents’ social influence on IT adoption and non-adoption. Journal of Information Technology 24(1), 11–24, doi: 10.1057/jit.2008.31.
Ferneley EH and Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. European Journal of Information Systems 15(4), 345–356, doi: 10.1057/palgrave.ejis.3000629.
Flanagan JC (1954) The critical incident technique. Psychological Bulletin 51(4), 327.
Fornell C and Larcker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18(1), 39–50, doi: 10.2307/3151312.
Gable GG, Sedera D and Chan T (2008) Re-conceptualizing information system success: the IS-impact measurement model. Journal of the Association for Information Systems 9(7), 1–32.
Gasparas J and Monteiro E (2009) Cross-contextual use of integrated information systems. Proceedings of the 2009 European Conference on Information Systems.
Gasser L (1986) The integration of computing and routine work. ACM Transactions on Information Systems 4(3), 205–225, doi: 10.1145/214427.214429.
Gilbert MR, Shegda KM, Chin K, Tay G and Koehler-Kruener H (2013) Magic quadrant for enterprise content management.
Grahlmann KR, Helms RW, Hilhorst C, Brinkkemper S and Van Amerongen S (2011) Reviewing enterprise content management: a functional framework. European Journal of Information Systems 21(3), 268–286, doi: 10.1057/ejis.2011.41.
Gremler DD (2004) The critical incident technique in service research. Journal of Service Research 7(1), 65–89, doi: 10.1177/1094670504266138.
Hair JF (2010) Multivariate Data Analysis. Prentice Hall, Upper Saddle River, NJ.
Hair JF (2014) A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage, Thousand Oaks (California) [etc.].
Halbesleben JRB, Savage GT, Wakefield DS and Wakefield BJ (2010) Rework and workarounds in nurse medication administration process. Health Care Management Review 35(2), 124–133, doi: 10.1097/HMR.0b013e3181d116c2.
Harman HH (1976) Modern Factor Analysis. University of Chicago Press, Chicago.
Henseler J, Ringle CM and Sarstedt M (2015) A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 1–21.
Hulland J (1999) Use of partial least squares (PLS) in strategic management research: a review of four recent studies. Strategic Management Journal 20(2), 195–204, doi: 10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7.
Ignatiadis I and Nandhakumar J (2009) The effect of ERP system workarounds on organizational control: An interpretivist case study. Scandinavian Journal of Information Systems 21(2), 3.
Iivari J (2005) An empirical test of the DeLone-McLean model of information system success. ACM SIGMIS Database 36(2), 8–27, doi: 10.1145/1066149.1066152.
Joshi K (1991) A model of users’ perspective on change: the case of information systems technology implementation. MIS Quarterly 15(2), 229, doi: 10.2307/249384.
Kim H-W and Kankanhalli A (2009) Investigating user resistance to information systems implementation: A status quo bias perspective. MIS Quarterly 33(3), 567–582.
Kim SS (2009) The integrative framework of technology use: an extension and test. MIS Quarterly 33(3), 513–538.
Klaus T and Blanton JE (2010) User resistance determinants and the psychological contract in enterprise system implementations. European Journal of Information Systems 19(6), 625–636, doi: 10.1057/ejis.2010.39.
Klaus T, Wingreen SC and Blanton JE (2010) Resistant groups in enterprise system implementations: a Q-methodology examination. Journal of Information Technology 25(1), 91–106, doi: 10.1057/jit.2009.7.
Koopman P and Hoffman R (2003) Work-arounds, make-work, and kludges. IEEE Intelligent Systems 18(6), 70–75, doi: 10.1109/MIS.2003.1249172.
Koplowitz R, Rymer JR, Hammond JS and Brown V (2013) SharePoint enters its awkward teenage years. Customer struggles with social, cloud, and mobile signal A transition.
Koppel R, Wetterneck T, Telles JL and Karsh B-T (2008) Workarounds to barcode medication administration systems: their occurrences, causes, and threats to patient safety. Journal of the American Medical Informatics Association 15(4), 408–423.
Landis JR and Koch GG (1977) The measurement of observer agreement for categorical data. Biometrics 33(1), 159, doi: 10.2307/2529310.
Lapointe L and Rivard S (2005) A multilevel model of resistance to information technology implementation. MIS Quarterly 29(3).
Laumer S (2016) Information quality dimensions: two exploratory case studies with enterprise content management system users. In 24th European Conference on Information Systems, Paper 141, Istanbul, Turkey.
Laumer S, Beimborn D, Maier C and Weinert C (2013) Enterprise Content Management. Business & Information Systems Engineering 5(6), 449–452, doi: 10.1007/s12599-013-0291-3.
Laumer S, Maier C, Eckhardt A and Weitzel T (2014) Why are they grumbling about my new system? Theoretical foundation and empirical evidence of employee grumbling as a user resistance behavior. Proceedings of the 2014 International Conference on Information Systems.
Laumer S, Maier C, Eckhardt A and Weitzel T (2015a) User personality and resistance to mandatory information systems in organizations. A theoretical model and empirical test of dispositional resistance to change. Journal of Information Technology 31(1), 67–82, doi: 10.1057/jit.2015.17.
Laumer S, Maier C, Eckhardt A and Weitzel T (2016) Work routines as an object of resistance during information systems implementations. Theoretical foundation and empirical evidence. European Journal of Information Systems 25(4), 317–343, doi: 10.1057/ejis.2016.1.
Laumer S, Maier C and Weitzel T (2015b) Successfully implementing enterprise content management: lessons learnt from a financial service provider. In Proceedings of the 36th International Conference on Information Systems (ICIS 2015), Fort Worth, Tx, USA.
Lee YW, Strong DM, Kahn BK and Wang RY (2002) AIMQ: a methodology for information quality assessment. Information & Management 40(2), 133–146, doi:10.1016/S0378-7206(02)00043-5 .
Liang H, Saraf N, Hu Q and Xue Y (2007) Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management. MIS Q 31(1), 59–87.
Maier C, Laumer S, Eckhardt A and Weitzel T (2013) Analyzing the impact of HRIS implementations on HR personnel’s job satisfaction and turnover intention. The Journal of Strategic Information Systems 22(3), 193–207, doi: 10.1016/j.jsis.2012.10.003.
Maier C, Laumer S, Eckhardt A and Weitzel T (2015a) Giving too much social support: social overload on social networking sites. European Journal of Information Systems 24(5), 447–464, doi: 10.1057/ejis.2014.3.
Maier C, Laumer S, Weinert C and Weitzel T (2015b) The effects of technostress and switching stress on discontinued use of social networking services: a study of Facebook use. Information Systems Journal 25(3), 275–308, doi: 10.1111/isj.12068.
Marakas GM and Hornik S (1996) Passive resistance misuse: overt support and covert recalcitrance in IS implementation. European Journal of Information Systems 5(3), 208–219, doi: 10.1057/ejis.1996.26.
Markus ML (1983) Power, politics, and MIS implementation. Communications of the ACM 26(6), 430–444, doi: 10.1145/358141.358148.
Martinko MJ, Zmud RW and Henry JW (1996) An attributional explanation of individual resistance to the introduction of information technologies in the workplace. Behaviour & Information Technology 15(5), 313–330, doi: 10.1080/014492996120085a.
Mcgann ST and Lyytinen K (2008) The improvisation effect: a case study of user improvisation and its effects on information system evolution. Proceedings of the 2008 International Conference on Information Systems.
Mckinney V, Yoon K and Zahedi FM (2002) The measurement of web-customer satisfaction: an expectation and disconfirmation approach. Information Systems Research 13(3), 296–315, doi: 10.1287/isre.13.3.296.76.
Nahm AY, Rao SS, Solis-Galvan LE and Ragu-Nathan TS (2002) The Q-sort method: assessing reliability and construct validity of questionnaire items at a pre-testing stage. Journal of Modern Applied Statistical Methods 1(1 (Article 15)).
Nordheim S and Päivärinta T (2006) Implementing enterprise content management: from evolution through strategy to contradictions out-of-the-box. European Journal of Information Systems 15(6), 648–662, doi: 10.1057/palgrave.ejis.3000647.
Nunnally JC (1967) Psychometric Theory. McGraw-Hill, New York.
Paivarinta T and Munkvold B (2005) Enterprise content management: an integrated perspective on information management. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences, p. 96, IEEE.
Patterson ES, Rogers ML, Chapman RJ and Render ML (2006) Compliance with intended use of bar code medication administration in acute and long-term care: an observational study. Human Factors: The Journal of the Human Factors and Ergonomics Society 48(1), 15–22.
Pavlou PA, Liang H and Xue Y (2007) Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective. MIS Quarterly 31(1), 105–136.
Petrides LA (2004) Costs and benefits of the workaround: inventive solution or costly alternative. International Journal of Educational Management 18(2), 100–108, doi: 10.1108/09513540410522234.
Petter S, Delone W and Mclean E (2008) Measuring information systems success: models, dimensions, measures, and interrelationships. European Journal of Information Systems 17(3), 236–263, doi: 10.1057/ejis.2008.15.
Petter S, Delone W and Mclean E (2012) The past, present, and future of “IS success”. Journal of the Association for Information Systems 13(5), 341–362.
Petter S, Delone W and Mclean E (2013) Information systems success: the quest for the independent variables. Journal of Management Information Systems 29(4), 7–62, doi: 10.2753/MIS0742-1222290401.
Pfaffenberger B (1992) Technological dramas. Science, Technology & Human Values 17(3), 282–312.
Pitt LF, Watson RT and Kavan CB (1995) Service quality: a measure of information systems effectiveness. MIS Quarterly 19(2), 173, doi: 10.2307/249687.
Podsakoff PM, Mackenzie SB, Lee J-Y and Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology 88(5), 879–903, doi: 10.1037/0021-9010.88.5.879.
Polites GL and Karahanna E (2012) Shackled to the status quo: the inhibiting effects of incumbent system habit, switching costs, and inertia on new system acceptance. MIS Quarterly 36(1), 21.
Polites GL, Roberts N and Thatcher J (2012) Conceptualizing models using multidimensional constructs: a review and guidelines for their use. European Journal of Information Systems 21(1), 22–48.
Pollock N (2005) When is a work-around? Conflict and negotiation in computer systems development. Science, Technology & Human Values 30(4), 496–514.
Ragu-Nathan TS, Tarafdar M, Ragu-Nathan BS and Tu Q (2008) The consequences of technostress for end users in organizations: conceptual development and empirical validation. Information Systems Research 19(4), 417–433, doi: 10.1287/isre.1070.0165.
Rai A, Lang SS and Welker RB (2002) Assessing the validity of IS success models: an empirical testand theoretical analysis. Information Systems Research 13(1), 50–69, doi: 10.1287/isre.13.1.50.96.
Richins ML (1987) A multivariate analysis of responses to dissatisfaction. Journal of the Academy of Marketing Science 15(3), 24–31.
Ringle CM, Wende S and Becker J-M (2015) SmartPLS 3. SmartPLS GmbH.
Rivard S and Lapointe L (2012) Information technology implementers’ responses to user resistance: nature and effects. MIS Quarterly 36(3), 897.
Russell B (2007) ‘You Gotta lie to IT’: software applications and the management of technological change in a call centre. New Technology, Work and Employment 22(2), 132–145.
Safadi H and Faraj S (2010) The role of workarounds during an opensource electronic medical record system implementation. Proceedings of the 2010 International Conference on Information Systems.
Salisbury WD, Chin WW, Gopal A and Newsted PR (2002) Research report: Better theory through measurement-developing a scale to capture consensus on appropriation. Information Systems Research 13(1), 91–103, doi: 10.1287/isre.13.1.91.93.
Selander L and Henfridsson O (2012) Cynicism as user resistance in IT implementation. Information Systems Journal 22(4), 289–312, doi: 10.1111/j.1365-2575.2011.00386.x.
Strong DM and Miller SM (1995) Exceptions and exception handling in computerized information processes. ACM Transactions on Information Systems (TOIS) 13(2), 206–233.
Strong DM and Volkoff O (2010) Understanding organization-enterprise system fit: a path to theorizing the information technology artifact. MIS Quarterly 34(4), 731–756.
Truex D, Baskerville R and Travis J (2000) Amethodical systems development: the deferred meaning of systems development methods. Accounting, management and information technologies 10(1), 53–79.
Turel O (2014) Quitting the use of habituated hedonic information systems. European Journal of Information Systems.
Tyrväinen P, Päivärinta T, Salminen A and Iivari J (2006) Characterizing the evolving research on enterprise content management. European Journal of Information Systems 15(6), 627–634, doi: 10.1057/palgrave.ejis.3000648.
Venkatesh V, Morris M, Davis G and Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quarterly 27(3), 425–478.
Vogelsmeier AA, Halbesleben JR and Scott-Cawiezell JR (2007) Technology implementation and workarounds in the nursing home. Journal of the American Medical Informatics Association 15(1), 114–119, doi: 10.1197/jamia.M2378.
Volkoff O, Strong DM and Elmes MB (2007) Technological embeddedness and organizational change. Organization Science 18(5), 832–848, doi: 10.1287/orsc.1070.0288.
Vom Brocke J, Simons A, Herbst A, Derungs R and Novotny S (2011) The business drivers behind ECM initiatives: a process perspective. Business Process Management Journal 17(6), 965–985, doi: 10.1108/14637151111182710.
Vom Brocke J, Sonnenberg C and Buddendick C (2014) Justifying ECM investments with the return on process transformation: the case of an ECM-driven transformation of sales processes at Hilti Corporation. In Enterprise Content Management in Information Systems Research (Vom Brocke J and Simons A, Eds), pp. 255–277, Springer, Berlin.
Williams LJ, Edwards JR and Vandenberg RJ (2003) Recent advances in causal modeling methods for organizational and management research. Journal of Management 29(6), 903–936, doi: 10.1016/S0149-2063_03_00084-9.
Williams MD, Dwivedi YK, Lal B and Schwarz A (2009) Contemporary trends and issues in IT adoption and diffusion research. Journal of Information Technology 24(1), 1–10, doi: 10.1057/jit.2008.30.
Wixom BH and Todd PA (2005) A theoretical integration of user satisfaction and technology acceptance. Information Systems Research 16(1), 85–102, doi: 10.1287/isre.1050.0042.
Wright RT, Campbell DE, Thatcher JB and Roberts N (2012) Operationalizing multidimensional constructs in structural equation modeling: recommendations for IS Research. Communications of the Association for Information Systems 30(1), 23.
Zeelenberg M and Pieters R (2004) Beyond valence in customer dissatisfaction: a review and new findings on behavioral responses to regret and disappointment in failed services. Journal of Business Research 57(4), 445–455.
Acknowledgement
Some parts of the qualitative study have been presented at the European Conference of Information Systems (ECIS) 2016 in Istanbul, Turkey (Laumer, 2016).
Author information
Authors and Affiliations
Corresponding author
Additional information
Associate Editor: Yogesh K. Dwivedi
Editor: Pär Ågerfalk
Appendices
Appendix A: Item development for workarounds
We develop and validate measurement items for workarounds in four steps in line with methods used in prior research developing new scales and developing new items systematically and rigorously (e.g., Chin et al, 1997; Maier et al, 2015a; Ragu-Nathan et al, 2008; Salisbury et al, 2002).
Step 1: Item development
In a first step, we scanned the recent literature discussing user resistance behavior (see Table A9 for an overview). In this step, we identified some user resistance behaviors related to IS implementations and developed an initial set of items for the proposed variable. We focused especially on those papers taking qualitative approaches to identify workarounds and used the example statements provided to define a first set of items for a variable that can capture the manifestation of workarounds in an empirical study.
In parallel, we also interviewed 20 employees in the target organization (see methodology section) to (a) identify examples of users’ workarounds in the organization and (b) identify the drivers and consequences of workaround behavior. Based on our analysis of the literature and the interviews, we developed a pool of items as illustrated in Table A1.
Step 2: Assessing reliability and construct validity of the new items
Using q-sorting, we tested the reliability and validity of the new proposed items (Landis and Koch, 1977; Nahm et al, 2002) inviting 39 students from our university to participate in a q-sorting test. We developed a list of items including the newly developed ones for workarounds, items proposed by Kim & Kankanhalli (2009) and by Laumer et al (2014) for different user resistance behaviors. We included the existing ones as it is recommended by q-sorting to include items of similar constructs. Hence, items of two established user resistance constructs were included alongside the newly developed ones for workarounds. Moreover, we created an introductory statement defining each variable and instructions how to proceed. In the test, each individual read the introductory statement and assigned each item to one of the three constructs. Based on the assignment, we calculated ratios to evaluate the number of individuals matching the items to the correct variable. Using these results, we removed each item (WA-5) which was assigned by less than 61%, as suggested by prior research (Landis and Koch, 1977).
Step 3: Exploratory and confirmatory factor analysis
Using the remaining items of step 2, we conducted an additional survey in an organization focusing on another ECM system, as described above. The purpose of this survey was to collect data for an exploratory and confirmatory factor analysis to further evaluate the validity and reliability of the items for the new constructs. Therefore, a questionnaire was developed focusing on ECM usage, workarounds, user resistance, and several perceptions of the ECM in the organization. The data collected were used to conduct an exploratory factor analysis using SPSS 22. For this test, we used the newly developed items and the ones proposed for user resistance (Kim & Kankanhalli, 2009) and employee grumbling (Laumer et al, 2014). Our results reveal a three-factor structure. In a second step, the dataset was used to perform a confirmatory factor analysis using SPSS 23. Both steps revealed the same factor structured as illustrated in Table A2.
Step 4: Construct reliability and discriminant validity
In a next step, we focused on the reliability and discriminant validity of the newly proposed measurement model of workarounds, calculating Cronbach’s alpha for the remaining variables of step 3. The resulting value of 0.82 indicates a good construct reliability of the newly developed measurement model for workarounds (Hair, 2010; Nunnally, 1967). Furthermore, we performed again an explorative factor analysis to ensure convergent and discriminant validity. In this step, each item was assigned to the intended construct, confirming convergent and discriminant validity.
In summary, the measurement development process resulted in four items, which were used for the newly proposed variable of workarounds in validating the proposed research model.
Appendix B: Discriminant validity of contextual and representational information quality
To further test the discriminant validity of contextual and representational information quality, additional studies were conducted. The purpose of these studies was to collect data for both a q-sorting study and an exploratory and confirmatory factor analysis to further evaluate the validity and reliability of the two information quality dimensions.
Using q-sorting, we tested the reliability and validity of the proposed information quality dimensions (Landis & Koch, 1977; Nahm et al, 2002) inviting 28 students from our university to participate in a q-sorting test. We included the characteristics identified in our qualitative study. We created an introductory statement defining the two dimensions and instructions how to proceed. In the test, each individual read the introductory statement and assigned each characteristic to one of the two dimensions. Based on the assignment, we calculated ratios to evaluate the number of individuals matching the items to the correct dimensions. As no characteristic was assigned by less than 61%, we conclude that the assignment of the characteristics to the two information quality dimensions is reliable and valid as suggested by prior research (Landis & Koch, 1977).
Furthermore, we also ran a factor analysis with the data collected in the main study of this paper. Also these tests reveal a two-factor structure using the characteristics identified in our qualitative study. Consequently, we include this structure in the main study to analyze the effect of representational and contextual information quality on the manifestation of workarounds.
Appendix C: Measurement items
Table A4 summarizes the definition for each quality characteristic used in our survey instrument.
Table A5 illustrates the measurement items used and the respecting loadings of each item for the respective construct.
Appendix D: Measurement model validation
Table A6 illustrates the reliability of the first-order constructs and the correlations between them.
Table A7 illustrates the cross-loadings of the items of the first-order constructs. The items are shown in Table A5 and are used in Table A7 in the same order as illustrated in Table A5.
Appendix E: ECM system vendors
Table A8 provides an overview of ECM software vendors.
Appendix F: User resistance studies
Workaround is one example of user resistance behavior observed in relation to the usage of enterprise systems such as ECM. There are other forms of user resistance behaviors which have already been discussed by prior research (see Table A9), whereas only few articles have explicitly focused on workarounds. Studies focusing on workarounds as user resistance behavior have used interviews to identify and describe potential ways users can work around an IS. They have not provided and applied an instrument for further empirical analysis in this area.
Rights and permissions
About this article
Cite this article
Laumer, S., Maier, C. & Weitzel, T. Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users. Eur J Inf Syst 26, 333–360 (2017). https://doi.org/10.1057/s41303-016-0029-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/s41303-016-0029-7