Author List: Kane, Gerald C.; Labianca, Giuseppe;
Information Systems Research, 2011, Volume 22, Issue 3, Page 504-522.
The information systems (IS) literature has focused considerable research on IS resistance, particularly in the health-care industry. Most of this attention has focused on the impact of IS resistance on systems' initial implementation, but little research has investigated whether and how post-adoption resistance affects performance. We focus on a particular type of post-adoption resistance, which we call IS avoidance, to identify situations in which individuals avoid working with adopted IS despite the need and opportunity to do so. We examine the effects of IS avoidance on patient care delivered by health-care groups across three levels of analysis: the individual level, the shared group level, and the configural group level. We find that IS avoidance is significantly and negatively related to patient care only at the configural group level, which suggests that patient care is not degraded by the number of doctors and/or nurses in a group avoiding a system, but rather by their locations in the group's workflow network configuration. We use qualitative data collected over 16 months at the research site to help explain these results. Implications for theory and practice are discussed.
Keywords: centrality; configural use; healthcare; IS avoidance; IS resistance; IS use; multilevel analysis; multimethod study; multimodal networks; performance; social networks
Algorithm:

List of Topics

#200 0.189 banking bank multilevel banks level individual implementation analysis resistance financial suggests modeling group large bank's services levels national data early
#196 0.126 health healthcare medical care patient patients hospital hospitals hit health-care telemedicine systems records clinical practices physician electronic physicians longitudinal outcomes
#93 0.113 performance results study impact research influence effects data higher efficiency effect significantly findings impacts empirical significant suggest outcomes better positive
#73 0.111 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate
#138 0.099 use question opportunities particular identify information grammars researchers shown conceptual ontological given facilitate new little constraints dual answer post-adoption theory
#233 0.090 group gss support groups systems brainstorming research process electronic members results paper effects individual ebs using used anonymity ideas discussion