IDEAS home Printed from https://ideas.repec.org/a/lrc/larijb/v4y2014i3p137-153.html
   My bibliography  Save this article

Symmetry in Social Construction during ERP Implementation: A Systems Security Perspective

Author

Listed:
  • Dr. Kennedy Njenga,PhD

    (Senior Lecturer, Department of Applied Information Systems, Faculty of Management, University of Johannesburg)

Abstract

The principle of symmetry in enterprise resource planning (ERP) systems implementation holds that the researcher should deploy impartial explanation in cases of success as in cases of failure. This article examines the symmetry intrinsic in social construction within the various stages of the ERP development life cycle, from initiation to implementation. Discourse on symmetry focuses on whether social constructs are able to influence ERP implementation positively (success) or negatively (failure) and whether this exposes ERP systems to information security risk. The theoretical lens of social construction of technology (SCOT) theory, a theory premised on social interaction between agents and technology artefacts, is applied for this purpose. The research was quantitative with a survey having been conducted on information technology (IT) and information security (IS) practitioners. Results of the study highlight the significant role social construction plays because of the direct linkage it has with the implementation of information security controls in ERP systems. The research delineated five social constructs, namely positional influence, reward influence, coercive influence, expert influence and referent influence. For purposes of this research and on the sampling criteria applied, the construct ‘expert influence’, a typology of social construction, is shown to be more domineering than other typologies of social construction and is seen as providing symmetrical balance between governing ERP security (success) and risk (failure). Implications of these results for theory and practice are discussed in the main article.

Suggested Citation

  • Dr. Kennedy Njenga,PhD, 2014. "Symmetry in Social Construction during ERP Implementation: A Systems Security Perspective," International Journal of Business and Social Research, LAR Center Press, vol. 4(3), pages 137-153, March.
  • Handle: RePEc:lrc:larijb:v:4:y:2014:i:3:p:137-153
    as

    Download full text from publisher

    File URL: http://thejournalofbusiness.org/index.php/site/article/view/416/358
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Shapiro, Brian & Baker, C. Richard, 2001. "Information technology and the social construction of information privacy," Journal of Accounting and Public Policy, Elsevier, vol. 20(4-5), pages 295-322.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Dr. Kennedy Njenga,PhD, 2014. "Symmetry in Social Construction during ERP Implementation: A Systems Security Perspective," International Journal of Business and Social Research, MIR Center for Socio-Economic Research, vol. 4(3), pages 137-153, March.
    2. Jongwoo Kim & Richard L. Baskerville & Yi Ding, 2020. "Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online," Information Systems Frontiers, Springer, vol. 22(1), pages 171-185, February.
    3. Mariya Dobryakova & Zoya Kotelnikova, 2015. "Social Embeddedness of Technology: Prospective Research Areas," Foresight and STI Governance (Foresight-Russia till No. 3/2015), National Research University Higher School of Economics, vol. 9(1), pages 6-19.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:lrc:larijb:v:4:y:2014:i:3:p:137-153. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Al Hossain (email available below). General contact details of provider: http://www.thejournalofbusiness.org .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.