ArticlePDF Available

Towards a Critical Systems Thinking Approach during IT Adoption in Organisations

Authors:

Abstract and Figures

The increasing complexity and diversity of Information Technologies (IT) adoption in organisations may require a multidisciplinary approach to understand its challenges. This complexity is mainly caused by different stakeholder constituencies with different worldviews the organisations. This paper explores user perceptions on critical systems thinking approaches during IT adoption in organisations. It is based on two case studies. The study results indicate that critical systems thinking approaches may be useful during IT adoption in organisations. The results suggest that critical systems thinking approaches have the potential to improve IT adoption success in organisations through addressing both technical and social issues. The results also suggest that addressing these issues during IT adoption may result in positive outcomes.
Content may be subject to copyright.
Procedia Computer Science 100 ( 2016 ) 856 864
1877-0509 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
Peer-review under responsibility of the organizing committee of CENTERIS 2016
doi: 10.1016/j.procs.2016.09.235
ScienceDirect
Available online at www.sciencedirect.com
Conference on ENTERprise Information Systems / International Conference on Project
MANagement / Conference on Health and Social Care Information Systems and Technologies,
CENTERIS / ProjMAN / HCist 2016, October 5-7, 2016
Towards a Critical Systems Thinking Approach during IT Adoption
in Organisations
Osden Jokonya
*
North-West University, Mafikeng Campus, Mmabatho, 2735, South Africa
Abstract
The increasing complexity and diversity of Information Technologies (IT) adoption in organisations may require a
multidisciplinary approach to understand its challenges. This complexity is mainly caused by different stakeholder constituencies
with different worldviews the organisations. This paper explores user perceptions on critical systems thinking approaches during
IT adoption in organisations. It is based on two case studies. The study results indicate that critical systems thinking approaches
may be useful during IT adoption in organisations. The results suggest that critical systems thinking approaches have the
potential to improve IT adoption success in organisations through addressing both technical and social issues. The results also
suggest that addressing these issues during IT adoption may result in positive outcomes.
© 2016 The Authors. Published by Elsevier B.V.
Peer-review under responsibility of SciKA - Association for Promotion and Dissemination of Scientific Knowledge.
Keywords: : Systems Approaches, Total Systems Intervention, Critical Systems Practice, Paradigms, Meta-methodology, Emancipation,
Pluralism, IT Adoption
1. Introduction
IT adoption in organisations is complex. In organisations, there exists multiple stakeholders whose varied
interests informed by their own beliefs and values must be considered. According to Jokonya et al. (2012), IT
adoption refers to the decision to implement information technology in organisations. The main challenge of IT
*
Corresponding author. Tel.: +0-000-000-0000 ; fax: +0-000-000-0000 .
E-mail address: osden.jokonya@nwu.ac.za
© 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
Peer-review under responsibility of the organizing committee of CENTERIS 2016
857
Osden Jokonya / Procedia Computer Science 100 ( 2016 ) 856 – 864
adoption is the need to reconcile different constituencies’ worldviews in the organisations. Many researchers
concede that a reductionist approach based on blueprint models which served organisations well in the past may not
be suitable for today’s complex organisational environment (Cordoba, 2009; Jokonya et al., 2012). Traditional
reductionist approaches offer simple solutions to complex problems where sophisticated solutions are needed
(Jackson, 2003). However, little research has been conducted on understanding the perceptions of users regarding
the importance of critical systems thinking approaches during IT adoption in organisations. These approaches have
been credited with embracing more than one approach in a single problem situation during IT adoption in
organisations (Jackson, 2010).
The literature points to the importance of critical systems thinking approaches during IT adoption in
organisations. This paper explores user perceptions of the importance of critical systems thinking approaches during
IT adoption in organisations. It is based on case studies of two organisations that agreed to participate in the
research. The study focuses on perceptions of users on the importance of critical systems thinking approaches during
IT adoption in organisations. The study was guided by the following questions: What are the users’ perceptions of
the critical systems thinking approaches during IT adoption in organisations? What are the perceived users’ expected
benefits of critical systems thinking approaches during IT adoption in organisations? This paper is structured as
follows: Section, 2, presents a brief literature on IT adoption and critical systems thinking approaches. This is
followed by section 3 which discusses the research methodology. Section 4 then presents the research results.
Finally, section 5 presents the discussion and conclusion.
2. Literature Review
2.1. Critical Systems Thinking
Most of the traditional scientific approaches (systems engineering, operations research and systems analysis)
failed to recognize the social aspect of IT adoption in organisations (Jackson, 2003). The traditional scientific
approaches were successful in optimizing performance in organisations. The challenges of traditional scientific
approaches are that they offer simple solutions to complex organisational problems where sophisticated solutions are
needed. The failure of traditional scientific approaches to cope with complex problems in organisations led to the
emergence of systems approaches (Jackson, 2003). Many challenges facing organisations, owing to the diverse
nature of the operations, may require to be confronted with more than a single systems approach (Reynolds, 2014;
Ulrich et al., 2010). This may be the case when issues to be addressed include those of emancipation, empowerment,
emotion, pluralism, efficiency and efficacy.
Jackson (2010) defines critical systems thinking (CST) as the commitment to use different systems approaches,
their related methodologies and methods together in system intervention. The trans-disciplinary nature of CST
allows the use of different approaches, methodologies and methods in a single complex IT adoption problem
situation (Jackson, 2010; Reynolds et al., 2010). The critical systems thinking approaches focus on five
commitments: critical awareness, social awareness, emancipation, theoretical pluralism and methodological
pluralism. One of the benefits from critical systems thinking is the complementary strengths of social theory and
systems thinking during IT adoption in organisations (Midgley, 2011; Jackson, 2010; Reynolds, 2014).
The critical systems thinking approaches were developed after realization of the weaknesses and strengths of
individual approaches and the need for pluralist approaches. Pluralism encourages looking at problem situations
from different perspectives and the use of different systems methodologies in combination (Jackson, 2010; Reynolds
et al., 2010). The multiple approaches to a problem situation help to get better appreciation of the problem situation
than a single approach. The diversity of approaches each addressing a particular problem situation was not a crisis
but an advantage in the ability to address a variety of IT adoption problem contexts in organisations. The
pragmatist’s point of view notes that it is important to select methods based on what works to address problem
situation. Pluralism appreciates the strengths of different methodologies and suggests situations in which they may
be used together (Jackson, 2010; Reynolds et al., 2010).
Reynolds et al., (2010) contend that critical systems thinking approaches are suitable for addressing technical
(how), social (what) and political (why) complex problem situations in organisations. Reynolds et al., (2010) argue
that systems approaches are only a partial representation of the whole problem situation. They highlight that critical
858 Osden Jokonya / Procedia Computer Science 100 ( 2016 ) 856 – 864
systems thinking approaches address the inadequacies of hard and soft systems thinking by considering issues of
power relations in systems interventions. The critical systems thinking assumption is that the combination of
different system approaches is important to address their weaknesses to systems interventions (Jackson, 2010).
Critical systems thinking addresses the weaknesses of hard systems thinking and soft systems thinking, using
social theories with commitment to critique, emancipation and pluralism. Some critics are however skeptical about
the values of critical systems approaches to managers as they are mostly occupied with issues of efficiency,
effectiveness and consensus, which are of greater importance to most organisations than diversity issues (Jackson,
2010; Cordoba, 2009). It has been criticized for being too irrational and for promoting anarchy in organisations. The
next sub-sections discuss the Total Systems Intervention critical systems thinking approach.
2.2. Total Systems Intervention
Total systems intervention (TSI), a meta-methodology, was developed to encourage the combination of
methodologies to confront complex IT adoption problem situations (Jackson, 2003; Raza & Standing, 2010;
Petrovic, 2012). Total systems intervention encompasses commitments related to social awareness, critical
awareness, methodological pluralism, emancipation and pluralism at the theoretical level. TSI uses Habermas’
(1970) theory of three human interests (technical, practical and emancipatory) to represent the different systems
approaches. The technical interest is represented by the hard systems thinking with emphasis on efficiency and
efficacy during IT adoption in organisations (Jackson, 2010; Petrovic, 2012). The practical interest is represented by
the soft systems thinking with emphasis on pluralism of worldviews during IT adoption in organisations. The
emancipatory interest is represented by the emancipatory systems thinking with emphasis on empowerment and
emancipation during IT adoption in organisations (Jackson, 2010; Raza & Standing, 2010).
The human interest analysis is important to appreciate the assumption behind each approach including strengths
and weaknesses (Jackson, 2010; Ulrich et al., 2010). The critical awareness is important to understand social
contexts suitable for different systems approaches. Although pluralism focuses at the theoretical level, it has faced
criticism from those in support of paradigm incommensurability (Jackson, 2010; Raza & Standing, 2010). Paradigm
incommensurability assumptions are that it is inconceivable that different systems methodologies can be used
together in any complementary way. Critical systems thinkers legitimized pluralism using Habermas’ (1970) theory
of human interests from its critics and supporters of paradigm incommensurability (Jackson, 2010; Ulrich et al.,
2010; Reynolds, 2014). The use of different methods to deal with complex IT adoption problem situations puts total
systems intervention ahead of other systems approaches (Jackson, 2010; Reynolds et al., 2010). Total systems
intervention does not support pragmatism, like critical systems practice, as it argues that it is impossible and prefers
dominant and dependent methodology during intervention to problem situations in organisations (Jackson, 2010;
Reynolds et al., 2010). The next sub-sections discuss the Critical Systems Practice.
2.3. Critical Systems Practice
Critical systems practice (CSP) is a meta-methodology for critical systems thinking (CST) theory. The CSP
development was encouraged by the popularity of pluralism in methods in other disciplines such as evaluation
research and organisation theory (Jackson, 2011; Reynolds, 2014). The interest in multi-methodology resulted in a
community of those interested in critical system thinking. Jackson (2006) says “instead of the five commitments of
critical systems thinking, critical systems practice has three commitments: critical awareness, improvement and
pluralism”. The critical awareness commitment placed emphasis on the critique of strengths and weaknesses of
various methodologies to complex IT adoption problem situations (Jackson, 2011; Reynolds, 2014). The
improvement commitment has emphasis on promoting fairness, empowerment and emancipation as part of
improvement. The pluralism commitment encourages the use of different methods, methodologies and theories in
combination to address complex problem situations in organisations.
The CSP accepts pragmatism in that its use delivers greater benefits than a single paradigm and that different
methodologies can be used based on the nature of the intervention to the problem situation (Jackson, 2011;
Reynolds, 2014). The mix and match method allows maximum freedom to address complex IT adoption problem
situations without any restriction on tools available (Jackson, 2011; Reynolds, 2014). While CSP supports
859
Osden Jokonya / Procedia Computer Science 100 ( 2016 ) 856 – 864
unrestricted multi-methods use, it demands explicit recognition of the paradigms which the methods are being used
to serve and has been credited with being able to handle complex IT adoption problem situations that may require
more than one system approach to resolve (Jackson, 2011; Reynolds, 2014). It affords the use of a wider variety of
tools in combination to respond to complex IT adoption problem situations in organisations because there may be a
need to use hard and soft systems thinking approaches to resolve the problem situation.
Critics, however, argue that the requirement to change from one conflicting paradigm to another may present a
challenge to users. Midgley (2011) concurs that at times the easy solution is that one paradigm is always favoured.
The other challenge to CSP is ethical choices because of it holistic nature. Whilst it can be acknowledged that CSP
seems difficult to use, it must also be accepted that organisation problem situations such as IT adoption are
becoming more complex and diverse, which cannot be addressed by simple solutions (Jackson, 2003; Jackson, 2010;
Reynolds, 2014). The next section discusses the research methodology used to conduct this study.
3. Research Methodology
The case study research strategy in information systems research is accepted because of its suitability to provide
understanding of the relationship between organisations and technology (Oates, 2009). Case study research has been
found to be a viable research strategy in information systems because of its in-depth approach. The case study
research provides an opportunity for the researcher to understand IT adoption in a normally inaccessible
phenomenon (Oates, 2009). The case study also means that the participants are exposed to the same IT adoption
environment, which is useful to understand their perceptions from a single setting. Most of the contemporary issues
dealt with in case study research are common to many organisations. In addition, case study research provides an
opportunity of first hand evidence on a particular phenomenon. Case study research may adopt a single case or
multiple case designs depending on the research objectives (Eisenhardt, et al., 2007). One of the contentious
questions has been how many cases are sufficient for multiple case studies and there is no simple answer as it
depends on the research purpose and question (Rowley, 2002). This research used two case studies which were
sufficient to address the research objectives and questions.
3.1. Case Study Selection
The research site was purposefully selected to help answer the research questions. The researcher used purposive
sampling in order to select data collection units that yielded the most relevant and broad range of perspectives and
information of the research area (Yin 2009). Two companies agreed to participate in the study from six that were
approached by the researcher. The basis for selecting these two organisations for the research was the diversity and
appropriateness of cases. Data was gathered about participants’ opinions on the importance of hard systems
approaches during on IT adoption in organisations.
3.2. Data Collection
The data collection, using questionnaires, took three months. About two hundred questionnaires were distributed
to employees of the two companies. The questionnaires had pre-defined questions seeking participants’ perceptions.
A five point Likert scale was used to develop the questionnaire. The questionnaire was pre-tested with a few
participants to refine the questions. The questionnaire variables were tested using Cronbach’s alpha values to see if
they were reliable and acceptable. The questionnaire variables were above 0.80, which is an indication of good
reliability at 0.88 (Van Voorhus, 2007). About ninety valid questionnaires were returned from the two companies.
The returned questionnaires represented a 45 percent response rate. Quantitative data from the questionnaires was
captured and analyzed using SPSS (Statistical Package for the Social Science) version 21.
3.3. Sample Size
Quantitative research offers guidelines on sample sizes needed for different statistical procedures, unlike
qualitative research which does not have an agreed sample size (Nunnally, 1978). The sample size of 90 cases was
860 Osden Jokonya / Procedia Computer Science 100 ( 2016 ) 856 – 864
therefore found to be adequate for the required statistical procedures. The descriptive statistics used include
frequency tables, T-test and analysis of variance (ANOVA) to provide summarized data for discovering trends,
patterns and ease of communication and understanding
4. Results
This section presents the results from the data collected using questionnaires. This section is organized as
follows: section 4.1 presents the demographic data, section 4.2 presents the frequencies of the variables, section 4.3
presents t-test results, section 4.4 presents the results from the analysis of variance and finally section 4.5 presents
the results from the correlation.
4.1. Demographic Characteristics
The Table 1 presents the respondents’ demographic characteristics which include: company type, age, gender,
departments, position, education, and involvement in IT adoption, number of years in the organisation and member
status.
Table 1. Demographics (n=90).
Variable Categories Count Percentage (%)
Company Type Manufacturing
Retail
45
45
50
50
Age 30yrs & below
31- 40 years
41-50
51 and over
27
33
23
7
30
37
26
8
Gender Male
Female
49
41
54
46
Department Finance
IT
Other
22
18
60
24
20
66
Position Other
Clerical
Managers
Supervisors
25
8
24
33
28
8
27
37
Education Matriculates
1st Degree
2nd Degree
38
32
20
42
36
22
Involvement Involved
Not involved
38
52
42
58
No of Years 2 years & below
3-5 years
6-10 years
More than 10 yrs
31
23
20
16
34
26
22
18
Co Member Members
Non Members
45
45
50
50
861
Osden Jokonya / Procedia Computer Science 100 ( 2016 ) 856 – 864
The next section presents the critical systems thinking variable frequency distribution. The frequencies are based
on the results collected using the questionnaires from the two organisations which participated in the study.
4.2. Frequencies
Figure 1 below presents the frequency of the critical systems thinking variables. Sixty two percent of the
respondents agreed that stakeholder diversity of perception was important in IT adoption. Slightly more than half of
the respondents agreed that it was important to address issues of oppression during IT adoption compared to those
who disagreed or were neutral. Slightly less than a third of the respondents agreed that it was important to address
political issues during IT adoption compared to those who disagreed or were neutral. More than half of the
respondents agreed that it was important to address social issues during IT adoption compared to those who
disagreed or were neutral. Eighty percent of the respondents, 85 percent, agreed that it was important to address
critical issues during IT adoption compared to those who disagreed or were neutral. Seventy percent agreed that it
was important to address ethical issues during IT adoption compared to those who disagreed or were neutral.
Figure 1. Frequencies
Nearly three quarters of the respondents agreed that it was important to identify affected stakeholders during IT
adoption. More than half of the respondents agreed that it was important to emancipate stakeholders during IT
adoption in organisations. Most of the respondents, 73 percent, agreed that it was important to identify beneficiary
stakeholders during IT adoption compared to those who disagreed or were neutral. Seventy four percent agreed that
it was important for IT adoption to be legitimate for all stakeholders compared to those who disagreed or were
neutral. A majority of the respondents agreed on most of the critical systems variables with more the fifty percent.
They also agreed that affected stakeholders needed to be identified, emancipated for IT adoption to be legitimate.
The next section presents the T-test results.
4.3. T-Test
The T-test conducted with demographic variables and the critical systems thinking variables showed significant
differences between the companies and it is important to address ethical issues during IT adoption in organisations
862 Osden Jokonya / Procedia Computer Science 100 ( 2016 ) 856 – 864
(0.022), while it is important for IT adoption to be legitimate to all stakeholders (0.050). The gender variable
showed significant difference with variable: it is important to address critical issues (0.000). The involved variable
also showed significant differences with variables: it is important to address critical issues (0.001) and it is important
to identify beneficiary stakeholders (0.018). The committee member demographic variable showed significant
differences with variable: it is important to identify the affected stakeholders (0.000) and it is important to
emancipate stakeholders during IT adoption (0.006).
Table 2. T-test results
Independent
Variable Dependent Variable F Value Sig. Categories
Company Is it important to address ethical issues during IT adoption in
an organisation? 5.471 0.022* Retail or Manufacturing
Company Is it important for IT adoption to be legitimate to all
stakeholders in an organisation? 3.939 .050** Retail or Manufacturing
Gender Is it important to address critical issues during IT adoption in
an organisation? 29.119 .000*** Male or Female
Involved Is it important to address critical issues during IT adoption in
an organisation? 12.422 .001** Yes or No
Involved Is it important to identify beneficiary stakeholders during IT
adoption in an organisation? 5.760 .018* Yes or No
Committee Is it important to identify the affected stakeholders during IT
adoption in an organisation? 40.873 .000*** Yes or No
Committee Is it important to emancipate stakeholders during IT adoption
in an organisation 13.091 .006** Yes or No
Note: * p< 0.05, ** p<0.01, *** p<0.001., (n=90)
4.4. Analysis of variance
The Analysis of variance showed significance differences between position demographic variable and critical
systems thinking construct variables: it is important to identify the affected stakeholders (0.043) and it is important
to identify beneficiary stakeholders (0.017). Education demographic variable showed significant difference with
critical systems thinking construct variable: it is important to address issues of oppression during IT adoption in
organisations (0. 017). There was difference between matric and first degree respondents.
Table 3. Analysis of variance (ANOVA) results
Independent
Variable Dependent Variable F Value Sig. Categories
Position Is it important to identify the affected stakeholders
during IT adoption in an organisation? 2.842 .043* Manager and clerical (Manager,
Supervisor, Clerical and other)
Position Is it important to identify beneficiary stakeholders
during IT adoption in an organisation? 3.592 .017* Manager and clerical (Manager,
Supervisor, Clerical and other)
Education Is it important to address issues of oppression during
IT adoption in an organisation? 4.301 .017* Matric and First Degree (Matric,
First Degree, Second Degree)
Note: * p< 0.05, ** p<0.01, *** p<0.001., (n=90)
4.5. Correlation results
The Education demographic variable positively correlated with critical systems thinking construct variables: it is
important to address critical issues during IT adoption (0.046), it is important to address ethical issues during IT
adoption (0.018) and it is important to identify beneficiary stakeholders (0.037).
863
Osden Jokonya / Procedia Computer Science 100 ( 2016 ) 856 – 864
Table 4. Correlation results.
Variable Is it important to address
critical issues during IT
adoption in an organisation?
Is it important to address
ethical issues during IT
adoption in an organisation?
Is it important to identify the
affected stakeholders during IT
adoption in an organisation?
Is it important to identify
beneficiary stakeholders
during IT adoption in an
organisation?
Education 211*
.046 .249*
.018 220*
.037
Note: * p< 0.05, ** p<0.01, *** p<0.001., (n=90)
5. Discussion and conclusion
The study results suggest that while most respondents agree that critical systems thinking is important during IT
adoption in organisations. The T-test indicated that there are significant differences in the perceptions of the
respondents based on their demographic variables. Overall, the, there are some significant differences on
respondents’ perceptions. The analysis of variance (ANOVA) results indicated that there are also significant
differences in perceptions based on respondents’ demographic characteristics. The results support the literature in
that different stakeholder constituencies have different worldviews with regards to IT adoption in organisations.
Correlation analysis also showed that the less the education the respondents possessed, the more oppression
becomes an issue during IT adoption in organisations. The result supports the literature that some stakeholders are
marginalized during IT adoption in organisations. This therefore calls for emancipatory systems approaches during
IT adoption in organisations.
The results therefore support literature in that the complexity of IT adoption in organisation may require a trans-
disciplinary approach which draws concepts and ideas from different disciplines with different strengths in the
interest of complementarity. Based on results, this study therefore contributes to knowledge on the importance of
critical systems thinking during IT adoption in organisation. The value of critical systems thinking is enhanced by
the addition of multi-disciplinarity in addressing some of the complex challenges of IT adoption in organisations.
The limitation of the study is that it is based on a case study whose results which cannot be generalized. However,
this provides an opportunity for further study using other research strategies. In conclusion, the paper stimulates
further research in understanding the contribution of critical systems thinking to complex IT adoption in
organisations based on its holistic nature of embracing multiple systems approaches.
References
1. Cordoba JR Critical reflection in planning information systems: A contribution from critical systems thinking, Information Systems Journal,
2009; 19(2):123–147.
2. Eisenhardt KM, Graebner ME, Theory Building from Cases: Opportunities and challenges, Academic of Management Journal, 2007;
50(1):25-32.
3. Habermas J, On Systematically Distorted Communication. Inquiry, 1970; 13(1/4):205-218
4. Jackson MC, Reflections on the Development and contributions of Critical Systems Thinking and Practice System Research and
Behavioural Science, 2010; 27:133-139.
5. Jackson MC, Systems Thinking: Creative Holism for Managers, Chichester, UK: John Wiley and Sons, 2003.
6. Jokonya O, Kroeze, JH, van der Poll JA “Towards a framework for decision making regarding IT adoption”, Proceedings of the South
African Institute for Computer Scientists and Information Technologists Conference, ACM, NY, USA, 2012; p. 316-325.
7. Midgley G, Theoretical Pluralism in Systemic Action Research. Systemic Practice and Action Research, 2011, 24(1):1-15.
8. Nunnally JC, Psychometric Theory (2
nd
ed.). New York McGraw-Hill, 1978.
9. Oates BJ, Researching Information Systems and Computing, Sage, UK, London, 2009.
10. Petrovic PS, A Critical Systems Meta-methodology for Problem Situation Structuring, International Journal of Decision Support System
Technology, 2012; 4(1):1-13.
11. Raza AS, Standing C, Towards a Systemic Model on Information Systems' Adoption Using Critical Systems Thinking. Journal of Systems
and Information Technology, 2010, 12(3):96–209.
12. Reynolds M, Equity-Focused Developmental Evaluation using Critical Systems Thinking. Evaluation: The International Journal of Theory,
Research and Practice, 2014, 20(1):75-95.
13. Reynolds M, Holwell S (2010). Introducing approaches. In: Reynolds, Martin and Holwell, Sue eds. Systems Approach to managing
Change: A Practical Guide. London: Springer, 2010:1-2.
864 Osden Jokonya / Procedia Computer Science 100 ( 2016 ) 856 – 864
14. Rowley J, Using Case Studies in Research, Management Research News. 2002, 25(1).
15. Van Voorhus RWC, Morgan LB, Understanding Power and Rules of Thumb for determining Sample sizes”, Tutorials in Quantitative
Methods for Psychology, 2007, 3(2):43-50.
16. Yin RK, Case study research, Design and methods. 4. ed. Thousand Oaks, California, 2009.
... Systems thinking approach useful strategy for ICT adoption in Zimbabwe. Systems thinking is a way of looking at the world that emphasizes the interconnectedness of all things (Jokonya, 2016). It is a useful tool for strategizing and addressing complex problems such as the challenges of ICT integration in Zimbabwe. ...
Conference Paper
Full-text available
The information, communication, and technology (ICT) are two interconnected topics that are crucial in today's digital age. In today's world ICT has become an essential tool for communication, education, and economic growth. Access to the internet has become a basic human right, with more than half of the world's population using it, and infrastructure development is critical for providing this access, particularly in Africa. In today's modern world, the internet is a vital tool for communication, education, and economic growth. This paper explores internet access and infrastructure development in Africa, to identify the impacts, challenges, and solutions for improving access. An extensive literature review is done which will assist in identifying and addressing key issues related to internet access and infrastructure development, as well as providing insights into how to maximize the benefits of these technologies for individuals and communities.
... The understanding of the complexity of D4D caused by different constituencies with different viewpoints can be addressed using a multidisciplinary approach (Jokonya 2016). There must be appropriate motivations to create value and governance structures that make stakeholders to balance openness and dominance amongst themselves (Constantinides, Henfridsson & Parker 2018). ...
Article
Full-text available
Background: Digital technology adopted in agriculture value chains (AVCs) improves efficiency. There is a need to understand why some actors benefit more than others in AVCs and why this pattern at a global level is replicated locally. Objectives: To understand how existing frameworks can enhance the understanding of Digital for Development (D4D) associated with digital AVCs to achieve the following: Distribute power and economic value amongst actors in the AVC more equally; retain the identity of small-scale farmers and their sustainable practices; establish effective communication to confront asymmetric information and the lack of access to knowledge effectively; to enhance research, development and innovation. Method: The method used is a Systematic Literature Review (SLR). Numerous frameworks to implement digital AVCs were assessed and presented. These were then compared and aligned to policies and strategies that may be associated with D4D in South Africa. Ultimately, a framework that lists the institutional information, digital services and Information and Communication Technology (ICT) design architecture was proposed. Results: This article proposes a framework for the implementation of Provincial Agriculture Digital Innovation Hubs (PADIHs) and Extended District Agro-food Sustainable Knowledge Hubs (DASKHs). These institutions will support small-scale farmers to adopt digital technology in their AVCs. Conclusion: When answering the research question, an alternate conceptualisation of a framework for digital AVCs adoption is made. This helps D4D practitioners and scholars who implement or research digital AVCs to better organise, conceptualise and conduct their research going forward. This research adds to the literature of D4D. It presents a better understanding of how small-scale farmers are empowered when adopting a digital AVC.
... In this traditional context, the adoption of IT is part of a mechanism by which the organization decides to choose and acquire a technology, to propose it, and often to impose it on the involved members of the organization (Jokonya, 2016;Venkatesh et al., 2003). The organizational benefits of traditional IT adoption depend on user acceptance and appropriation of the resulting changes in work practices (Orlikowski & Hofman, 1997). ...
Conference Paper
Les institutions de santé assistent aujourd’hui au développement des pratiques liées à l’informatique parallèle ou Shadow IT (SIT), soit l’utilisation d’outils informatiques (notamment appareils et applications) sans l’approbation des directions informatiques. Malgré les avantages avérés de ces pratiques, la SIT est synonyme de vulnérabilités d’autant plus préoccupantes que les institutions de santé hébergent des données de santé considérées comme étant sensibles. L’action publique, directement concernée par les dangers liés à la sécurité des données de santé, doit faire face à des cyberattaques répétées et croissantes auprès des hôpitaux français. Cette action s’exprime notamment par une protection particulière via les textes incluant le RGPD. Fondée sur une revue narrative de la littérature comprenant 159 articles, la question ici posée est donc de savoir comment les établissements de santé peuvent bénéficier des avantages des pratiques de SIT tout en s’assurant de la protection des données des patients.
... This trend favors a reversal of the traditional logic of IT adoption, which is a top-down process managed and initiated by IT managers in organizations. In this traditional context, the adoption of IT is part of a mechanism by which the organization decides to choose and acquire a technology, to propose it, and often to impose it on the involved members of the organization (Jokonya, 2016;Venkatesh et al., 2003). The organizational benefits of traditional IT adoption depend on user acceptance and appropriation of the resulting changes in work practices (Orlikowski & Hofman, 1997). ...
Article
Currently, health care institutions are confronted with practices related to Shadow IT (SIT) that allow employees to improve their efficiency through tools that complement corporate-provided IT resources. Although SIT practices can be beneficial, they also create additional vulnerabilities and access points for cyberthreats in institutions where patient data are regarded as sensitive. Therefore, this research addresses the following question: What are the benefits and risks of SIT-related practices in health care? Based on a narrative review of the literature, including 220 articles, this research highlights several specificities of the health care context and their impact on research related to IT adoption and information security behaviors. In terms of managerial contributions, we formulate several proposals to better manage SIT-related risks, such as staff awareness and zero trust solutions. We also contribute to the academic literature by highlighting the interest of questioning specific drivers of reverse IT adoption, the phenomenon of pseudo-compliance and the impact of neutralization techniques. We also make several proposals for future research, such as studying the impact of emergency situations on the behavior of health care personnel.
... There is a need to understand more about the motivations and implications across the range of actors (Constantinides et al., 2018). Thus, digital development requires a multidisciplinary approach to understand the increasing complexity caused by different stakeholder constituencies with different worldviews (Jokonya, 2016). Deichmann and Mishra (2019) argue that for us to make sure digital technology is deployed to empower the poor, the focus should be on strengthening the business environment, improving skills development, and holding the public sector accountable. ...
Article
Full-text available
Digital technologies enable small-scale farmers to reduce some constraints to participate in Agriculture Value Chains (AVCs). Small-scale farmers face significant challenges and barriers to adopting digital technology. This study contributes to the literature on digital development in three ways: present the economic, political, and social factors affecting digital adoption in the AVCs; highlight the implications for governance and institutional challenges;adds knowledge to the analytical value of the Choice Frameworkto study digital technology adoption. This paper after identifying more than 100 papers and articles, uses a Systematic Literature Review (SLR) aligned with Cooper’s [(2010). Research synthesis and meta-analysis: A step-by-step approach (5th ed.). Sage] approach to examine 52 articles published from 2014 to 2019, ultimately selecting the most relevant 36 studies. The study uses the Choice Framework that operationalizes the Capabilities Approach (CA) as a theoretical window for this research. Papers were classified into four different categories: economic; political; social factors; institutional/governance. The findings show: - the role of the state in governance and institutional support is critical to facilitate the collaboration and participation of different actors;-the importance to develop a comprehensive localized developmental implementation framework that can support the adoption of digital solutions to support small-scale farmers. Limitations for this study are highlighted and areas for further research are suggested.
... We believe that it is feasible to link the project structure to the systemic connections inherent in professional activity; it reveals the possibilities for discussing both pedagogical and industry-specific tasks, issues, and problems. Jokonya (2016) considers the issue of training analysts capable of implementing information technologies in company activities, which requires an interdisciplinary approach. Digitalization raises the issue of combining digital and information and communication training and the development of critical and systems thinking skills. ...
Article
The purpose of the study is to show the possibility and feasibility of developing a systems mindset in the process of shaping competencies in information technology while the educational process is based on online learning. The features of the limitations of perception by first-year students in the field of systems that use digital technologies have been analyzed. An experiment based on the methodology for the development of a systems mindset in first-year students on the basis of a project-based approach in the process of online learning has been carried out. The study involved 250 students. The number of students who received average grades increased by 14.9 %; the number of students that received high grades increased by 15.65 % and 42.83 %, respectively. In the post-test of the experimental group, there were no participants who failed all tests. In the control group, there were no changes in the quality of a systems mindset. The novelty of the research concept is the fact that students learn the concepts of interactions in different systems in their first year of study that takes place in the online learning environment. The finding of the study can be useful for teachers of vocational universities that train first-year students.
... Flood and Jack son (1991b) is an early version of such a fieldbook. The TLL fieldbook benefits from (p. 208) fieldwork that has refined old methods and developed new ones (e.g., Chowdhury and Jangle 2018;Jiuping, Dai, Rao, Xie, and Lu 2016;Jokonya 2016;Larsen 2011;Panagi otidis and Edwards 2001;Raymaker 2016;Reynolds 2014;Schwandt 2015;Smith 2011;Stephens 2013;Venter 2018). In addition, collaboration between systems researchers and action researchers has generated further ideas about engaging with the triple question (e.g., Burns 2007;Flood 2010;Greenwood and Levin 2007;Reason and Bradbury 2001; journal Systemic Practice and Action Research). ...
Chapter
Full-text available
The systems idea is at the heart of the Learning Organization (LO). This chapter revisits the LO in the light of a revised understanding of the systems idea. It introduces the basic premises of three fundamentally different theories about the systems idea. It briefly reviews Senge’s work and the LO literature with these three theories in mind. It interprets the LO in terms of the most defensible of the three theories: Critical Systemic Thinking. It considers critical systemic practice as an alternative “Fifth Discipline Fieldbook”. This “mighty step” involves a paradigm shift and redefining relationships between: employees and management, management and consultants; and organizations, the wider human society, and the living planet.
... Technological innovation has traditionally been viewed and analyzed as a top-down process: This innovation is designed and initiated in organizations by IT managers and IT specialists. In this context, IT adoption, as part of the appropriation process, is part of a mechanism by which the organization decides to choose and acquire a technology, to propose it, or even to impose it with regard to organizational actors (Jokonya, 2016;Venkatesh, Morris, Davis, & Davis, 2003). In organizations, the investment decision, constrained by the stakes involved and the necessities of return on investment, is generally planned and organized by CEOs. ...
Article
This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, tablets and smartphones) to fulfil organizational tasks. BYOD provides opportunities, including the possibility of working differently, for both CEOs and end users. However, BYOD involves high organizational and end user security risks. What are the benefits and risks for CEOs and end users of the reversed adoption logic of BYOD, and how can BYOD-related security paradoxes be overcome? A theoretical analysis is conducted with regard to the concept of the “reversed IT adoption logic” vs. the traditional IT adoption logic. This analysis highlights the security paradoxes linked to this reversed IT adoption and proposes means to overcome these paradoxes. If BYOD entails many opportunities, then it requires information security management to balance the induced risks for CEOs and users.
Article
This article proposes a cross-situational specialization framework for what, at its introduction, was a newer generation personal computer (PC) device (a tablet computer). With use as the basis for continuance adoption as the theoretical lens, this article explores how the tablet coexists as a substitute- and a complement-in-use with incumbent PC(s). To test a model consisting of cross-situational use patterns, determinants, and outcomes, this article develops and analyzes the results of a survey of tablet computer use in a learning and education context. The results show a stronger coexistence between the tablet and the incumbent devices when the devices perform the same tasks in different, compared to the same, situations. Additionally, use of the PC devices as distinct units depends more on the situational sophistication of their features for use than sophistication of the devices per se . Further, user perception of the tablet's in-use impact depends on its performance in situations where the incumbent devices have limited sophistication, while user perception of the tablet as an essential device depends on its extension of the uses of the incumbent devices to different situations. This article implies that when a newer generation personal mobile device is an imperfect substitute for incumbent PC devices, individual adoption of such a mobile device may facilitate a partial reversal of information technology adoption in organizations.
Article
Full-text available
Most of the traditional technology acceptance models revolve around information systems (IS)/information technology (IT) adoption at individual user level. Organizations are complex social systems in which stakeholders interact and play different roles in IS/IT adoption and use. This study provides an organizational perspective through multiple stakeholder viewpoints to explore ‘systemic problems’ in IS adoption. This paper contributes to IS literature by applying boundary critique mechanism of Critical Systems Heuristics (CSH) through an interpretive study of a web portal implementation project in a West Australian University. This perspective considers systemic problems as a ‘system of conflicts’ comprising key factors and organization-wide stakeholder interactions. Moreover, it adds to CSH theory as to how systemic problems are identified by using boundary judgments and evaluated using a hermeneutic approach.
Article
Full-text available
Developmental evaluation can often question the ethical basis of an intervention in terms of whether it’s ‘doing the right thing’ rather than merely ‘doing things right’. Drawing on ideas from critical systems thinking and critical systems heuristics, an evaluation framework with a pro-equity focus is suggested. The framework addresses issues of complexity. It invites theories of change associated with philosophical ethics, and provides a means of surfacing and potentially transforming debilitating relations of power in a complex evaluand. A case study of the long-standing Narmada project in India is used to sketch the workings of the framework. The article describes how the underpinning methodological ideas of critical systems thinking incorporating triple-loop learning can enhance the practice of developmental evaluation.
Article
Full-text available
The emergence of critical systems thinking has allowed the transdiscipline of systems thinking to mature by setting out how the variety of systems methodologies available can be used together in a coherent manner to promote successful intervention in complex societal problem situations. Copyright © 2010 John Wiley & Sons, Ltd.
Article
Full-text available
It is now largely accepted as uncontroversial amongst systemic action researchers that there is practical value in theoretical pluralism: seeing through multiple theoretical ‘lenses’ that bring different (sometimes contradictory) assumptions into play. However, the practice of theoretical pluralism is paradoxically often justified with recourse to a single foundational epistemological theory: i.e., a theory of the nature of knowledge, accepted as universally true, which explains how it is that human beings can accept multiple theoretical perspectives. Justifying theoretical pluralism through the use of a foundational theory carries two risks. First, because the foundational theory is viewed as such a basic truth, it can become hard to accept other theories that may contradict it. Therefore, researchers may slip from an initial, strong commitment to theoretical pluralism to a more limited version that eliminates the use of theories that contradict the foundational one. The second risk is that the researcher’s understanding of his or her practice may come to be both constructed and evaluated using a single theoretical lens, so disconfirming evidence of the utility of that lens is never seen. Following an explanation of these risks, an alternative systemic approach to the philosophical justification of theoretical pluralism is advanced, and it is argued that this is less likely to introduce unwitting theoretical restrictions into action research practice than establishing a foundational epistemology. Finally, five consequences of this systemic perspective on theoretical pluralism are proposed: (i) knowledge cannot be regarded as universal and cumulative; (ii) theories are more or less useful depending on the purposes of intervention that are being pursued; (iii) we can think pluralistically about the agency and choices of the researcher; (iv) while it is impossible to produce universal standards for choice between theories, it is nevertheless still possible to generate standards of relevance to particular contexts; and (v) given that different theories inform different methodologies and methods, methodological pluralism (drawing upon methods from different paradigms) becomes a useful partner to theoretical pluralism. KeywordsBoundary critique–Epistemology–Methodological pluralism–Philosophy of action research–Process philosophy–Theoretical pluralism–Systemic intervention–Systems philosophy
Article
Full-text available
Purpose This paper aims to propose an extended version of systems development life cycle (SDLC) based on critical systems thinking for information system (IS) adoption in an organizational context from a management perspective. Design/methodology/approach The model integrates traditional SDLC with the ongoing process of “phase‐stakeholders‐identification” or “pha‐stak‐ification”. The emerging systemic stakeholder networks is proposed to be applied with network mechanisms to influence stakeholders' attitudes towards IS adoption. The authors, considering IS adoption as a multi‐phase innovation project, argue that boundary considerations using a multiple stakeholder perspective (boundary critique) provides an alternative focus for IS adoption. Findings The study suggests that the proposed model has the capacity to serve as a roadmap for a smooth IS adoption by facilitating organizational learning and change. Research limitations/implications The study has not been tested empirically. Originality/value Successful IS implementation improves organizational efficiency and creates competitive advantage. Established information technology adoption models like technology acceptance model and theory of reasoned action consider technology adoption from the users' viewpoint without taking a holistic perspective into account. This article takes a systems perspective to technology development and the systems development life cycle.
Conference Paper
Information Technology (IT) adoption challenges facing organizations are too complex to be resolved using only one methodology. Most existing Information Technology (IT) adoption models such as the Technology Acceptance Model (TAM) only consider individual behaviour and views on technology adoption, without providing mechanisms to accommodate multiple stakeholder perspectives in an organization. In this paper we propose an IT adoption framework, expected to assist an organization in resolving problem situations from multiple perspectives. Our framework provides mechanisms for addressing conflict of interest among stakeholders, which is rather common with IT adoption in organizations.
Article
The increasing complexity and diversity of management problem situations in organizations, as well as the increasing variety of theories, methodologies, methods, techniques, and models that can be employed in problem situation structuring and solving, must be considered as relevant aspects of management process in contemporary circumstances. Creative holism in management problem situations in organizations is enabled by means of Critical Systems Thinking (CST) as well as Critical Systems Practice (CSP), as the resulting metamethodology. In other words, through CST and CSP, it can be significantly contributed to the management of the increasing diversity and variety of methodologies, methods, techniques, and models, with the aim of improving the management of problem situations in organizations.
Article
Abstract This paper presents a methodological framework to support the process of information systems (IS) planning in organizations. It draws on the ideas of critical systems thinking (CST), a research perspective that encourages the analysis of stakeholders’ understandings prior to the selection and implementation of planning methods. The framework emphasizes continuous identification of concerns from stakeholders, and facilitates critical reflection in the exploration of possibilities for improvement. Some of these possibilities might require the support of IS and communication technologies. To define the framework, two systems theories are used: boundary critique and autopoiesis. The first one enables critical reflection on values and assumptions about potential situations or marginalization. The second one fosters continuous dialogue, listening and mutual collaboration between participants. With these theories, the framework enables people to reflect on issues of inclusion, exclusion and marginalization, and to participate in the design of plans for improvement. Ultimately, the definition of this framework suggests the importance of critical reflection about ethics to improve the practice of IS planning.
Book
Too often, today's managers are sold simple solutions to complex problems. But, as many soon discover, simplicity is rarely effective in the face of complexity, change and diversity. Despite apparent promise, quick-fix panaceas fail because they are not holistic or creative enough. They focus on parts of the organization rather than the whole, take little account of interaction, and pander to the notion that there is one best solution in all circumstances. As instances of such failure escalate, intelligent managers are increasingly seeking to improve results through Systems Thinking. Whatever stage you are at in your study of Systems Thinking this book will help. If you are new to the field then it will serve as a solid introduction. If you are familiar with a few concepts but not with how they can be linked and used by managers, then it will give you a greater understanding of how holistic ideas developed and how to use them in practice. And if you are expert in some approaches but not in others, then it will expand your knowledge and provide you with more choice. In all cases you will achieve competency in creative holism, emerge better equipped to solve complex problems, and ultimately become a more effective Systems Thinking manager.