You are on page 1of 12

Available online at www.sciencedirect.

com

ScienceDirect
International Journal of Project Management 33 (2015) 1262 – 1273
www.elsevier.com/locate/ijproman

Diagnosing organizational risks in software projects:


Stakeholder resistance
Simon L.R. Vrhovec ⁎, Tomaž Hovelja, Damjan Vavpotič, Marjan Krisper
University of Ljubljana, Faculty of Computer and Information Science, Ljubljana, Slovenia

Received 8 August 2014; received in revised form 28 January 2015; accepted 16 March 2015
Available online 29 March 2015

Abstract

Critical success and failure factors of software projects were extensively studied. However, software project risk management has rarely
researched organizational risks even though most problems occur when the social aspects are not addressed. By employing the resistance to change
theory, our paper develops an organizational risk diagnosing (ORD) framework in order to show how can organizational risks be better understood
and managed. Organizational risk factors may have non-trivial underlying root causes. A failure to diagnose them may result in ineffective risk
responses that address the symptoms. A case study of a loan application software project has been conducted in one of the biggest banks in South-
Eastern Europe. An analysis of the risk management process in the studied case allows a better understanding of organizational risk management.
© 2015 Elsevier Ltd. APM and IPMA. All rights reserved.

Keywords: Software project; Stakeholder resistance; Risk management; Bank

1. Introduction 38 percent have failed. This is at least worrying as large software


projects failure may negatively affect the whole implementing
Software project failure rates remain alarmingly high enterprise (Bernroider et al., 2014; Hong and Kim, 2002; Lavbič
despite surging investments in information systems and their et al., 2010).
importance for contemporary organizations (Altuwaijri and Software projects are high risk activities due to the rapid
Khorsheed, 2011; Baccarini et al., 2004; Bannerman, 2008; El pace of technological changes and the organizational changes
Emam and Koru, 2008; Hong and Kim, 2002). According to the they may impose (Aloini et al., 2007; Altuwaijri and
CHAOS Manifesto 2013 (The Standish Group, 2013), only 39 Khorsheed, 2011; Bannerman, 2008; Cule et al., 2000; Hong
percent of software projects were successful, i.e., completed and Kim, 2002; Kwahk and Kim, 2007; Li et al., 2011)
on-time and on-budget, with all features and functions as initially therefore risk management is essential for project success
specified. Another 43 percent of projects were challenged, i.e., (Baccarini et al., 2004; Tiwana and Keil, 2004; Wallace et al.,
completed and operational but over-budget, over the time 2004). In the recent years, much has become known about
estimate, and offer fewer features and functions than originally why software projects fail (de Bakker et al., 2010). Several
specified. The remaining 18 percent of software projects have risk factors have been identified and joined into checklists and
failed, i.e., they were cancelled prior to completion or delivered classification frameworks (Bannerman, 2008). Also, stepwise
and never used. When considering only large software projects, tasks for managing risks, also known as process models, are
only 10 percent were successful, 52 percent were challenged and widespread in theory and practice (Aloini et al., 2012;
Bannerman, 2008).
⁎ Corresponding author at: Večna pot 113, 1000 Ljubljana, Slovenia.
However, software project risk management seems to be
Tel.: + 386 1 479 8297.
rather immature as risks are still not managed effectively
E-mail address: simvrh@gmail.com (S.L.R. Vrhovec). (Aloini et al., 2007; Bannerman, 2008; de Bakker et al., 2010;
URL: http://simvrh.wordpress.com/. Geraldi et al., 2011; Kappelman et al., 2006; Kutsch and Hall,

http://dx.doi.org/10.1016/j.ijproman.2015.03.007
0263-7863/00/© 2015 Elsevier Ltd. APM and IPMA. All rights reserved.
S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273 1263

2005; Osipova and Eriksson, 2013). In addition to technical new loan application software is presented and analyzed. The
risks, software projects are subjected to organizational risks contributions of our research to risk management and resistance
since they affect or are affected by the way of doing things in an research are then discussed including the limitations of the study
organization (Benaroch et al., 2006; Sanderson, 2012; Sharma and further research opportunities.
and Gupta, 2012). These risks should not be overlooked as
most problems occur when the social aspects are not addressed 2. Theoretical background
(Atkinson et al., 2006; Laumer, 2011). People are one of the
greatest sources of uncertainty in any project undertaking 2.1. Software project risk management
therefore organizational risks are difficult to manage and
knowledge of risks alone is not enough to contribute to project The ISO 31000 Standard defines risk as the “effect of
success (de Bakker et al., 2010; Thamhain, 2013). Nonetheless, uncertainty on objectives” (ISO, 2009). Even though they are
organizational risk factors have been rarely researched (Aloini commonly viewed from the narrow perspective of the negative
et al., 2007). Risk management research has only recently side of the possible effect (Hartono et al., 2014), risks can have
shown more interest in stakeholder-related processes and put an both a positive or a negative effect on a project when present
emphasis on “soft skills” as a complement to the “hard skills” (Benaroch et al., 2006; ISO, 2009; Wallace and Keil, 2004). In
(de Carvalho and Rabechini Junior, 2015; Söderlund and software projects, much work has been done on discovering
Maylor, 2012). Research shows that different stakeholder risks, also known as risk factors (Benaroch et al., 2006). Other
perspectives need to be considered in order to build the bigger terms, such as “sources of risk”, “critical success factors”,
picture and manage risks effectively (Hartono et al., 2014). “uncertainty factors “, “risk drivers” or “risk items”, can also be
Among the most prominent and well-researched organiza- found in literature (Aloini et al., 2007; Bannerman, 2008;
tional risks in software projects is resistance to change (Hong Tiwana and Keil, 2004). In some risk management fields, such
and Kim, 2002; Jiang et al., 2000; Kim, 2011; Kwahk and Kim, as construction, risk factors are differentiated from risks. In
2007; Laumer, 2011; Lundy and Morin, 2013; Meissonier and contrast to established software project risk management where
Houzé, 2010; Rivard and Lapointe, 2012; Žvanut et al., 2011). risk factors are usually directly related to their effects (Aloini et
It has been thoroughly researched for over half of a century in al., 2007; ISO, 2009), construction project risk factors do not
managerial psychology and information systems research affect the project directly but do so through risks (Tah and Carr,
(Laumer, 2011; Oreg et al., 2011; Rivard and Lapointe, 2001). This distinction helps in risk evaluation because the risk
2012). Resistance to change is a complex phenomenon and factors are more concrete abstractions of a risk and define
several sources of resistance which can be considered as risk situations that can be individually assessed with a limited
factors have been identified in the literature. The success of amount of vague information or facts (Tah and Carr, 2001).
resistance management depends on the ability to diagnose Three main approaches to software project risk management
resistance, i.e., to distinguish symptoms from root causes can be found in theory and practice (Bannerman, 2008; de
(Fiedler, 2010; Laumer, 2011; Lundy and Morin, 2013; Rivard Bakker et al., 2010): checklists, classification frameworks, and
and Lapointe, 2012; Zander, 1950). process models. Checklists are formed by joining risk factors
The paper builds on the premise that organizational risks that have been identified in past projects (de Bakker et al.,
may not be managed effectively if one only focuses on project- 2010). Various checklists can be found in literature (Aloini et
specific risks or uses existing risk management approaches, al., 2007; Schmidt et al., 2001). Risk factors in checklists are
such as checklists and classification frameworks. Furthermore, commonly a mixture of technical and organizational risks
improving the existing approaches by considering different ordered by general risk probability in software projects (Aloini
stakeholder perspectives may not be enough if the stakeholders et al., 2007). Checklists are often comprised of too many
themselves do not distinguish the symptoms from the root potential risk factors to effectively identify and manage them
causes. The purpose of this paper is to move beyond the (Bannerman, 2008; Cule et al., 2000). To deal with this issue,
limitations of existing risk management approaches and some risk factors can be grouped and managed together. Using
advance the diagnosing of root causes of organizational risks the construction project risk management terminology, risk
from multiple stakeholder perspectives. By employing the factors are grouped into risks using some classification
resistance to change theory we develop a new theoretical model framework according to different criteria, e.g., their perceived
– the organizational risk diagnosing (ORD) framework. The source (Baccarini et al., 2004; Bannerman, 2008; Cule et al.,
ORD framework attempts to identify in a novel way the 2000; Keil et al., 1998; Liu and Wang, 2014; Wallace et al.,
non-trivial underlying root causes which organizational risk 2004). Since checklists and classification frameworks are
factors may have. closely related, they both have the same drawback. Risk factors
This paper is structured as follows. First, extant work on are generic and based on past research which raises the pros-
software project risk management and resistance to change is pect that risk assessment may be biased or limited in scope
summarized. The concept of stakeholder resistance is intro- (Bannerman, 2008).
duced. Next, the resistance checklist aggregating various works The third risk management approach is process models.
on resistance to change is developed. Afterwards, the proposed Process models specify risk management activities which follow
ORD framework is presented along with an application to the a general risk management process: establishing the context,
resistance context. A case study of a software project introducing risk identification, risk analysis, risk evaluation, risk treatment,
1264 S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273

communication and consultation, and monitoring and review User resistance manifest itself in various ways, such as
(Aloini et al., 2012; Baccarini et al., 2004; Bandyopadhyay et al., inaction, distance, lack of interest, delay tactics, excuses,
1999; Bannerman, 2008; de Bakker et al., 2012; ISO, 2009; persistence of former behavior, withdrawal, voicing opposite
Kwan and Leung, 2011). It is not uncommon to use all presented points of view, asking others to intervene or forming coalitions
approaches combined, e.g., to use checklists or classification (Lapointe and Rivard, 2005). In the most aggressive manifes-
frameworks in risk identification (Bannerman, 2008; de Bakker tations, user resistance seeks to be disruptive and may even be
et al., 2010). When combining these approaches, the focus is on destructive, e.g., infighting, making threats, strikes, boycotts
project-specific risk factors rather than the top-ranked generic and sabotage (Lapointe and Rivard, 2005).
risk factors (de Bakker et al., 2010). To achieve this, free-format Most resistance research focuses on resistance of the change
information generation techniques, such as brainstorming, may recipients. However, research shows that other stakeholders
be employed (de Bakker et al., 2010). may be contributing to resistance or resist themselves (Fiedler,
Until recently risk management research focused on “hard 2010; Ford et al., 2008; Laumer, 2011; Markus, 1983; Nutt,
skills” centering around administrative tasks (Söderlund and 1998; Rivard and Lapointe, 2012; Sigala, 2013). Focusing on
Maylor, 2012). Software projects involve a variety of stake- user resistance therefore may not be sufficient. The stakeholder
holders with complex interrelationships and diverse back- theory may be applied to resistance to change theory to extend
grounds (de Carvalho and Rabechini Junior, 2015). Different it. The stakeholder concept has its roots in strategic manage-
stakeholders may have varying or even conflicting perspectives ment and has already been applied to other research fields, such
on risks (Hartono et al., 2014; Osipova and Eriksson, 2013; as project and portfolio management (Beringer et al., 2013). A
Saunders et al., 2015). As it became apparent that effective risk software project stakeholder is any individual or group who can
management requires broad involvement and collaboration of affect or is affected by a software project (de Bakker et al.,
stakeholders, the focus of risk management research broadened 2011; Freeman, 2010). Different stakeholder views have to be
to encompass the “soft skills” concerning the management of considered in order to adequately analyze resistance (Beringer
interpersonal relationships and the notion of project environ- et al., 2013; Ford et al., 2008; Laumer, 2011). Therefore, we
ment as well (de Carvalho and Rabechini Junior, 2015; Liu and promote the concept of stakeholder resistance instead of the
Wang, 2014; Sanderson, 2012; Söderlund and Maylor, 2012). established but misleading term user resistance throughout this
paper.
2.2. Resistance to change
2.3. Resistance checklist
Lewin (1947) was one of the first researchers to use the term
resistance to change defined as the force against change in Theoretical explanations of stakeholder resistance and
organizations (Laumer, 2011). Resistance to change has been checklists can be found in information systems research.
thoroughly studied both in managerial psychology and informa- Theoretical explanations provide an insight into the stake-
tion systems research (Laumer, 2011). Managerial psychology holder resistance black-box (Rivard and Lapointe, 2012).
research mostly focused on individuals and some researchers Hirschheim and Newman (1988) state that resistance is a
even considered resistance as a personal trait (Laumer, 2011; complex phenomenon which can have a variety of causes,
Oreg, 2003). Information system research focused on user such as innate conservatism, lack of felt need, and uncertainty.
resistance defined as opposition of an individual user or groups According to Joshi (1991) users evaluate the software project
of users to change associated with a software project (Kim and on the individual, peer group and organizational level. Re-
Kankanhalli, 2009). User resistance may be present in before, sistance occurs when perceived inequity on either level of
during and/or after a software project (Kim and Kankanhalli, evaluation. Marakas and Hornik (1996) argue that perceived
2009; Meissonier and Houzé, 2010; Pardo del Val and Martínez threats or stresses that an individual associates with a software
Fuentes, 2003). Some authors even argue that user resistance project cause covert resistance. Martinko et al. (1996) posit
is embedded in the change process and therefore inevitable that individuals make causal attributions of a software project
(Ferneley and Sobreperez, 2006; Meissonier and Houzé, 2010). based on internal and external influences. These attributions lead
By itself, user resistance is neither positive nor negative to expectations about future performance outcomes whichmay
even though it is commonly associated by a negative conno- lead to resistance. Ferneley and Sobreperez (2006) identified four
tation (Ferneley and Sobreperez, 2006; Hultman, 2003; antecedent conditions to resistance, i.e., enforced procedurali-
Lawrence, 1954; Rivard and Lapointe, 2012; van Offenbeek zation, organizational and personnel issues, discipline and
et al., 2013). On one hand, it can be destructive and consume non-engagement with the system, which may result in various
excessive resources (Hong and Kim, 2002; Kim, 2011). On the kinds of workarounds. Kim and Kankanhalli (2009) argue that
other hand, there may be good reasons for user resistance. In switching costs indirectly increase resistance by negatively
such cases, user resistance can be constructive, e.g., if it reveals impacting perceived value. Markus (1983) adopted a political
flaws of the new software (Ferneley and Sobreperez, 2006; Ford et perspective of the interaction theory and suggested that resistance
al., 2008; Jiang et al., 2000; Kim and Kankanhalli, 2009; Lundy is a result of conflict among groups who are vying for power.
and Morin, 2013; Marakas and Hornik, 1996; Piderit, 2000). User Lapointe and Rivard (2005) found that resistance is milder in the
resistance therefore needs adequate management whether it is earlier stages of a software project. In these stages, resistance
positive or negative (Rivard and Lapointe, 2012). emerges as a combination of independent individual behaviors.
S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273 1265

Table 1
Resistance checklist.
Source of resistance Description
Lack of top management commitment Management should establish and clearly follow a vision of supporting and
encouraging the change. If other stakeholders do not perceive the management as
following the formal vision associated with the new software, they are unlikely to be
its willing advocates Aloini et al. (2012), Baccarini et al. (2004), Hirschheim and
Newman (1988), Lundy and Morin (2013), Pardo del Val and
Martínez Fuentes, (2003), Rumelt (1995).
Past outcomes Outcomes of past software projects influence the expectations about the current
software project which then drive individuals’ affective and behavioral reactions to it.
For example, users might refuse to accept undesired information due to hubris or it
may derive from fear of repeating a bad experience with an unsuccessful past
software project Martinko et al. (1996), Pardo del Val and
Martínez Fuentes, (2003), Rumelt (1995).
Perceived threats Individuals may associate a change and the uncertainties it brings with different kinds of threats.
For example, stakeholders may resist because they fear uncertainty, losing their jobs,
being transferred away from their friends, losing status, or sacrificing past investments
Hirschheim and Newman (1988), Jiang et al. (2000), Kim and Kankanhalli (2009),
Lapointe and Rivard (2005), Lawrence (1954), Long and Spurlock (2008),
Lundy and Morin (2013), Marakas and Hornik (1996), Pardo del Val and
Martínez Fuentes (2003), Rumelt (1995), Vrhovec et al. (2014).
Organizational politics Organizational politics are among the most prominent sources of resistance.
For example, the software project may cause a redistribution of resources which
could affect the balance of power among various interest groups in the organization
Altuwaijri and Khorsheed, (2011), Baccarini et al. (2004), Ferneley and Sobreperez (2006),
Hirschheim and Newman (1988), Jiang et al. (2000), Lapointe and Rivard (2005),
Markus (1983), Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Direct costs A temporal disruption of day-to-day work, temporally increased risk of organizational
failure and excess effort directly related to the software project Long and Spurlock (2008),
Lundy and Morin (2013), Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Capabilities gaps The gap between the tasks that need to be performed and the competencies and capabilities of
users (Fiedler (2010), Long and Spurlock (2008), Lundy and Morin (2013), Ocepek et al. (2013),
Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Collective action problems Refusal of users to fully use the new software or identify with it due to the difficulty of deciding
who is going to move first or general apathy Ferneley and Sobreperez (2006),
Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Myopia Inability of the management to look into the future with clarity due to the expected dominance of
short-term goals over long-term goals Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Conservatism Conservatism manifests itself as resistance when the new software enforces changed work
processes and structures as users prefer to stay with the way of doing things to which they are
accustomed to Ferneley and Sobreperez (2006), Hirschheim and Newman (1988),
Hong and Kim (2002), Jiang et al. (2000), Lundy and Morin (2013),
Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Reactive mindset Stakeholders may resist if the believe that obstacles are inevitable
Long and Spurlock (2008), Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Incommensurable beliefs A strong disagreement between groups about the nature of the problem and its consequent
alternative solutions Atkinson et al. (2006), Hartono et al. (2014),
Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Groupthink Peer pressure and restricted thinking that groups impose, rejecting or even punishing
ideas and information that deviate too much from those generally accepted in the group
Eckhardt et al. (2009), Ferneley and Sobreperez (2006),
Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Speed and complexity Fast and complex changes in the enterprise’s environment that inhibit the ability of the
enterprises to analyze the situation properly Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).
Lack of perceived value Stakeholders may resist if benefits of the new software are relatively low compared to benefits of
the old software resulting in dulled motivation for change Fiedler (2010), Joshi (1991),
Kim and Kankanhalli (2009), Long and Spurlock (2008), Lundy and Morin (2013),
Pardo del Val and Martínez Fuentes (2003), Rumelt (1995).

In later stages of a software project, however, resistance may new software significance or even to the new software change
strengthen if individual behaviors converge. Additionally, the agents.
object of resistance is not always the new software. If the Stakeholder resistance has been compared to the symptoms
balance of power between interest groups is disrupted due to the of a bodily disease and checklists may help to diagnose it
software project, the object may switch from the new software to (Lawrence, 1954; Rivard and Lapointe, 2012). In this paper, we
1266 S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273

adopted Rumelt’s checklist which has also been empirically 3. Research method
tested (Pardo del Val and Martínez Fuentes, 2003; Rumelt,
1995). We adapted Rumelt’s checklist as presented in Table 1 An explanatory case study was used as research approach
to include the complementary findings. due to several reasons. First, the complex interaction of dif-
ferent stakeholders and new software can be best analyzed with
a case study (Trkman and Trkman, 2014; Vavpotič and
2.4. Towards an organizational risk diagnosing Hovelja, 2012). Next, case study is the most suitable research
(ORD) framework approach for investigating contemporary events with no control
over the environment (de Bakker et al., 2011; Trkman and
The main premise of this paper is that some organiza- Trkman, 2009; Yin, 2009). Finally, case study is particularly
tional risk factors may be symptoms with root causes that appropriate for studying software development and implemen-
are not trivial to determine. If risk factors are not properly tation in natural organizational settings (Bansler and Havn,
diagnosed, risk responses may therefore just address the 2004; Darke et al., 1998; Trkman and Trkman, 2014).
symptoms while leaving the underlying causes intact. In The unit of analysis of the case study was a software project
turn, this may lead to ineffective risk responses and hinder in one of the biggest banks in South-Eastern Europe. This bank
the success of risk management. To address these issues, competes in several national markets (e.g., Austria, Italy,
the organizational risk diagnosing (ORD) framework is Slovenia, Germany, and Serbia) and from this point of view can
proposed. For easier understanding, the ORD framework be considered a typical bank for the region. The new loan
is applied to the resistance context developed throughout application software that was implemented in the studied
the paper. The resulting ORD framework is presented in project replaced a legacy core banking system. The software
Fig. 1. project duration was 14 months and it primarily affected
First, stakeholder resistance can be considered as a software approximately 300 loan officers. Five key stakeholders were
project risk (Fiedler, 2010; Vrhovec and Rupnik, 2011). Next, identified: project management, business process management,
sources of this risk can be considered as risk factors. Finally, a IT personnel, key users, and loan officers. The project was
variety of root causes may be underlying these risk factors. managed by a project manager and his staff from the project
These causes may be project-specific and therefore cannot management office with the help of the chief training officer
be predetermined. In contrast to the traditional software from the IT department. The project team additionally included
project risk management theory, we argue that it is vital that the IT personnel from the IT department. Key users were also
organizational risk factors are first diagnosed in order to assigned to the project however they were not officially part of
determine the underlying root causes. Adequately deter- the project team. They were selected among loan officers by
mined root causes may significantly change the management their superiors. The project team gathered requirements directly
actions during and after the software project with reference from the key users. This included business processes require-
to effective risk management. ments which had to be later synchronized with the business

Fig. 1. Organizational risk diagnosing (ORD) framework.


S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273 1267

process department who had ownership over the business 4. Results and discussion
processes.
Data triangulation is used in this study to assure case study 4.1. Risk factors
validity and to provide confirmatory data (Molineux, 2013).
Different types of data and data provided by different stake- This subsection presents the results of the resistance
holders were compared against each other to ensure consistency checklist survey and the focus groups. The initial resistance
of the results (de Bakker et al., 2011; Molineux, 2013). Data checklist evaluation was done in a survey. The results are
was collected in open-ended interviews (Ahn et al., 2010), presented in Table 2.
surveys, focus groups (Ahn et al., 2010), and by documentation Based on the results of the survey, risk factors were
produced by the project, such as project reports and documen- categorized into four groups according to effect and probability
tation from the risk management process. means for all risk factors (effect mean = 0.17, probability
To assure reliability, a case study protocol was prepared mean = − 0.17) as presented in Table 3. For example, risk
(Yin, 2009). It included research questions, methods and factor “Past outcomes” has above mean effect (effect = 0.80)
procedures for data collection, and data analysis guidelines. We and below mean probability (probability = − 0.25). Therefore,
interviewed the project manager, the chief training officer, the it is categorized as high effect and low probability.
chief business analyst, and the chief information officer at Categorized risk factors were an input to the focus groups
various project milestones. In total, eleven interviews were that had to interpret them. Summarized and consolidated dif-
conducted. They varied in duration from 0.5 to 1.5 hours. ferent stakeholder interpretations are presented in the following
Additionally, a survey using the resistance checklist was paragraphs. First, risk factors with high effect and probability
conducted to assess probability and effect of risk factors. The were interpreted. The key users, the business process manage-
subjects of the survey were the 20 project team members. After ment and the loan officers stated that incommensurable beliefs
an explanation of the resistance checklist and effect measure- stem from a lack of knowledge of the IT personnel about the
ment items by the researchers, the respondents were asked to bank’s business processes that manifested itself from the start
complete the survey. The survey included a single-item of the project. The key users complained “We had to explain
measure for each of the resistance checklist items’ (see the business process over and over again“, which prolonged the
Table 1) probability and a multiple-item measure for their business process analysis considerably. Even so, they claimed
effect. The effect construct included 12 items building on the that the first prototypes presented to them were inadequate
well-established four-dimensional project success construct because the IT personnel did not sufficiently understand the
proposed by Atkinson (1999) which was further adapted to business processes. The IT personnel however complained that
include the findings of the DeLone and McLean Model of the key users were giving superficial descriptions of business
Information Systems Success (DeLone and McLean, 2003). processes. Also, in their opinion the key users tended to change
The effect measurement items included: time, cost, quality, their descriptions during the programming phase long after the
intention to use, user satisfaction, added value, strategic goals, business process analysis had been completed. Regarding
organizational learning, employee development, customer satisfac- groupthink, the business process management explained that
tion, satisfaction of suppliers, and satisfaction of owners. A the IT personnel tried to change the business processes during
reliability analysis was performed on the effect construct using the the business process analysis phase. They believed that they
Cronbach’s alpha method. Cronbach’s alpha values for different were not competent enough to propose a redesign of business
resistance checklist items varied from 0.817 (lack of top processes. The key users took a similar posture by stating that
management commitment) to 0.973 (capabilities gaps) which “They are just creating unnecessary work for us.” The IT
signifies high reliability (Chow and Cao, 2008; Markelj and personnel however explained that the key users and business
Bernik, 2014). A seven-point Likert scale (−3 = I strongly
disagree, 3 = I strongly agree) was used to assess all measurement
Table 2
items. The results of the survey were presented to five focus groups Initial risk assessment.
of four representing the five identified key stakeholders. First, each
Risk factor Effect Probability
focus group developed its own set of root causes based on the
survey results. Next, all developed sets of root causes were Incommensurable beliefs 0.87 0.20
Groupthink 0.80 0.10
presented to other focus groups. Finally, the focus groups began an
Speed and complexity 0.51 1.90
inter-group discussion resembling the Delphi method on possible Lack of top management commitment 0.92 − 0.20
root causes based on the presented sets. After the first iteration, Past outcomes 0.80 − 0.25
consensus on the underlying causes has already been achieved Myopia 0.66 − 0.85
therefore the process was not repeated. Reactive mindset 0.57 − 0.30
Conservatism 0.14 − 0.10
For validation, the conclusions on the root causes were
Lack of perceived value − 0.16 0.25
discussed with the management board comprising of the chief Collective action problems − 1.00 0.65
information officer, the chief manager of the project manage- Perceived threats − 0.36 − 1.20
ment office, the project manager, the chief business analyst, the Organizational politics − 0.76 − 0.65
chief end-user training officer, the chief software architect, and Direct costs − 0.60 − 1.15
Capabilities gap 0.00 − 0.80
the chief software designer.
1268 S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273

Table 3 dismantled behind it.” The project management explained that


Categorized risk factors. in their view the problems are being solved with short-term and
Effect Probability Risk factors superficial quick-fixes instead of solutions that would address
High High Incommensurable beliefs the real problems. The IT personnel additionally complained
Groupthink that they spend a lot of energy on solutions that do not bring
Speed and complexity significant long-term benefits to the bank, which decreases their
High Low Lack of top management
motivation to work on the project. Two interpretations of
commitment
Past outcomes reactive mindset were emphasized. The IT personnel brought
Myopia up the issues with the legacy core banking system. In the past,
Reactive mindset the IT personnel were very accommodating to the business
Low High Conservatism demands. The result was a very complex software environment
Lack of perceived value
consisting of hundreds of software applications in several
Collective action problems
Low Low Perceived threats programming languages. Such software environment was a
Organizational politics challenge to maintain. A large part of the IT personnel accepted
Direct costs such environment as normal. For this reason, it is not hard for
Capabilities gap them to a priori accept new demands in the project especially
since this means additional paid work hours. The key users also
process management just wanted them to mindlessly replicate considered the project in conflict with their interests. Not only
the existing business processes in the new software. An that they did not receive any additional remuneration for their
additional complaint of the IT personnel was that the key work on the software project, they also lost their variable
users were a priori negatively biased towards any proposed performance bonus from their regular assignments. Since the
changes during the business process analysis. The loan officers key users believed this issue was inevitable, this significantly
did not address the described conflict. Instead, they complained lowered their motivation to engage the project.
that they were poorly informed about the project. Their pre- Afterwards, risk factors with low effect and high probability
conceived negative opinion was based on their fear that the were interpreted. Concerning conservatism, the loan officers
project would trivialize the loan application process to the explained that the new software makes them more error-prone,
extent that “Even tellers could do it.” Loan officers with which is one of the criteria the management uses to compile the
opposing ideas were peer-pressured into changing their views lay-off list that is a part of the post-financial crisis downsizing
or isolated which suppressed the positive opinions among loan plan. The downsizing plan had already reduced the workforce
officers about the project. Interpreting speed and complexity, by approximately 15 percent. Thus, the loan officers attempted
the key users criticized the pace of work of the IT personnel by to defend the current way of doing things to minimize the threat
stating “It takes ages to implement a single checkbox!” The of making errors. This in turn impeded good collaboration of
project management and IT personnel however attributed this loan officers with the project team. It also increased the loan
to the European Central Bank (ECB) for overloading them with officers’ dislike of new technologies because, as they stated,
fast changing regulations that had to be implemented in the new “At present, it is hard to see over the edge of one’s cubical.”
software. During the course of the project ECB required that When interpreting lack of perceived value, the loan officers and
additional restrictions and fail safes to be added to the new key users remarked that the new loan application system will be
software. To make matters even more problematic, these new beneficial as it will be more centralized. However, they also
restrictions were not part of a single package but were released mentioned that the value of such centralized system would be
over several weeks. diminished if the improvements and bug-fixes would only be
Next, risk factors with high effect and low probability were locally applicable as they have been in the past. The question
interpreted. The key users were of the opinion that the bank’s whether middle managers were sufficiently informed on the
official strategy is not updated often enough which in their project as they show apathy towards it arose when loan officers
opinion clearly shows the lack of top management commitment interpreted collective action problems. However, this was not
to the project. They complained that it takes too much effort to considered as an important issue since the middle managers
submit and implement an idea that is yet to become a part of the were not opposing the project.
bank’s official strategy. For this reason, they never felt fully Finally, risk factors with low effect and low probability were
engaged in the project. When interpreting past outcomes, the interpreted. Stakeholders addressed these risk factors and
loan officers pointed out that the middle managers ignored the confirmed the evaluation done by the survey. However, no
project and refused to actively engage in it. In their opinion, interpretations were provided since all stakeholders considered
they had a generally negative attitude towards the project them as not present in the studied project.
because of bad experiences related to the introduction of the
legacy core banking system. When considering myopia, all 4.2. Diagnosing risk factors
stakeholders highlighted the dominance of the short-term goals
over the long-term goals. An interesting saying describing the Each stakeholder group presented their interpretation to the
situation has spread in the bank: “The bank is like a train that others. The results of the inter-group discussion are presented
runs on a railroad which is being build right in front of it and in this subsection. Four root causes have been identified
S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273 1269

underlying some of the risk factors as presented on Fig. 2. The changes to business processes have their roots in the desire of
root causes are elaborated in the following paragraphs. these stakeholders to be in control of the business process
Organizational issues have been identified as the first root redesign. The discussion showed that there is little willingness
cause. This root cause was underlying five risk factors: lack of of both sides for compromise and to accept the reasoning of the
top management commitment, past outcomes, myopia, reactive other. The business process management and the key users
mindset, and conservatism. Organizational issues encompass the justified their current dominant status through tradition. In
problems that four different stakeholders need to work with. In contrast, the IT personnel felt that their status was not being
the current organization, the key users never felt fully engaged in recognized because they were prevented from modifying the
the project because “It takes too much effort to realize an idea that business processes.
is not already a part of the strategy.” Additionally, the key users As the third root cause, threats to status were identified.
do not fully commit to the project because their involvement in it This root cause is also underlying two risk factors: groupthink,
directly reduces the variable part of their salary. The IT personnel and reactive mindset. The loan officers and the IT personnel
need to deal with the tendency of the business to push the perceived that their status has been threatened. The loan
short-term goals at the expense of the long-term ones. In their officers were concerned that the new software will enable
opinion, this not only negatively affects the long-term quality of employees with a lower status than themselves, such as tellers,
the new software but also hinders the development of new to conduct the loan applications without any significant
banking products. Another organizational issue was identified training. They considered this as a direct threat to their status
involving the middle management. When the loan officers and worth. One of the main goals of the software project was to
presented their interpretation of past outcomes, the business simplify the complex software environment. Some of the IT
process management openly opposed it. Instead, they proposed personnel considered this to be in direct conflict with their
that middle management’s apathy may stem from overload interest and status. Even though they realize that the current
with daily routine tasks. The project management confirmed software environment is too complex, the IT personnel still take
this assumption by stating that the middle management was professional pride in the fact that they can implement all
significantly overworked due to a recent downsizing plan. As a business requests not considering the consequences for the
consequence, the project was seen as a workforce drain that software environment.
hindered their day-to-day work. The downsizing plan also caused Communication issues were identified as the last root cause.
a final organizational issue involving the loan officers. New It underlies two risk factors: groupthink, and speed and
software was being introduced to them in an environment where complexity. Communication issues predominantly affected the
each mistake could put them on the lay-off list. It is therefore not a loan officers. They were informed about the project and its
surprise that they tried to defend the way of doing things they benefits through routine daily bank-wide newsletters. However,
were accustomed to. this communication channel proved ineffective as most loan
Struggle for power was identified as the second root cause. officers ignored or missed the positive information about the
It described how the IT personnel, the key users, and the project. The effectiveness of these newsletters was reduced due
business process management were vying for power. Struggle to information overload. On a typical day, up to five newsletters
for power was underlying two risk factors: incommensurable each consisting of one to five A4 pages plus attached docu-
beliefs, and groupthink. The conflicts between the IT personnel mentation were sent. As a result, an environment was created
on one side, and the key users and the business process where preconceived negative attitudes towards the project and
management on the other over who has the right to propose its team were spread through unfounded rumors. Communication

Fig. 2. Risk factors diagnosis.


1270 S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273

issues between the project management and the IT personnel challenge to diagnose (Fiedler, 2010; Hultman, 2003; Laumer,
on one side, and the key users on the other were also 2011). Hultman (2003) even suggests that all conclusions need
identified. The key users did not understand the reasons for to be regarded as hypotheses, open to modification if new
seemingly long IT personnel response times. The project information is revealed. As such, the resistance checklist may
management and the IT personnel apparently failed to only be one of the tools needed to adequately diagnose
communicate the reasons to them. stakeholder resistance. The results of its use may be used in
further resistance diagnosing activities preferably including
4.3. Analysis and discussion various stakeholders, such as the inter-group discussion that we
employed in our case.
With the application of the ORD framework we showed how
organizational risks can be better understood. The results of the
case study show that risk factors may indeed have non-trivial 5. Conclusion
underlying root causes. For eight risk factors out of fourteen
resistance checklist items, four root causes have been identified The challenge of the management of organizational risks has
nd analyzed: organizational issues, struggle for power, threats its roots in one of the greatest sources of uncertainty in any
to status, and communication issues. The analysis of the root project undertaking – people. This paper makes a number of
causes and their relations to risk factors raised several theoretical and practical contributions to the understanding of
interesting questions. this field. The first contribution is theoretical. We attempt to
In our case, the use of the checklist approach to risk management advance the understanding of organizational risks by proposing
would very likely be ineffective. For example, struggle for the ORD framework. The ORD framework posits that some
power was one of the identified root causes. Although this is an organizational risk factors may be symptoms with root causes
example of the organizational politics risk factor, both the that are not trivial to determine. Therefore, organizational risks
survey and the individual stakeholder focus groups failed to need to be diagnosed in order to identify the underlying root
detect it. Struggle for power surfaced only after interpretations causes. Our case study showed that only risk responses
of different stakeholders were put together. Similarly, per- addressing these root causes may be truly effective. The second
ceived threats were initially not detected but the threats to contribution is practical. We demonstrated how to use the
status were identified as one of the root causes. These findings proposed ORD framework to diagnose the risk of resistance to
seem to be in line with the study of de Bakker et al. (2011) who change. Similarly, the framework could be used to diagnose
reported that risk management activities which are meeting other organizational risks. The ORD framework has however
different stakeholder views, such as risk identification, create an important limitation which needs to be noted. It relies on
awareness and a common view among stakeholders. However, stakeholders providing their own views and opinions. If some
the possible implications of our case go another step further. of the key stakeholders refuse to cooperate or do not cooperate
Our findings suggest that looking at an issue from different faithfully in risk management, its effectiveness may be
stakeholder viewpoints and just aggregating the pieces of hindered. The third contribution is theoretical. This paper
information does not necessarily unfold all the details. A key updates Rumelt’s resistance checklist based on a review of both
step in creating awareness may be the “brainstorming effect” managerial psychology and information systems research. The
that took effect during the inter-group discussion. proposed resistance checklist consolidates into a common
During the case study, a stakeholder that was not framework the various aspects of stakeholder resistance that
participating in risk management activities has been identified. have been researched. The fourth contribution is practical. We
The project management initially did not consider the middle demonstrated how to use the proposed resistance checklist.
management as one of the key stakeholders. The middle It has proved to be an effective tool for early resistance
management was first mentioned in loan officers’ interpretations. identification. Nevertheless, the derived conclusions should be
When presented with them, both the business process regarded as hypotheses that need further investigation to
management and project management quickly discharged confirm or reject them.
their interpretations since they believed that they saw the This paper has some limitations the readers should note.
bigger picture themselves. Even though some organizational A single case study was conducted thus caution is needed
issues addressed the middle management, they were not when generalizing its results. The selected case was a single
directly included into the risk management process as this project in a large bank where various stakeholders were
was not deemed necessary. Instead, the project management present. Other organizational settings, such as smaller
and the business process management devoted themselves to organizations with fewer stakeholders, may produce differ-
consider them more in further risk management activities. ent results. The case study exposed software development
The proposed resistance checklist was compared against the methodology flaws regarding the communication of the
results of the study. Risk identification using the resistance project team with other project stakeholders. Additional
checklist proved only partially effective as the stakeholders research on improving these issues would be valuable. In
misjudged the significance of at least two risk factors. This our study, only the resistance risk was considered. Research
observation coincides with extant research on stakeholder considering other organizational risks would also be
resistance which considers it a complex phenomenon that is a beneficial.
S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273 1271

Conflict of interest DeLone, W.H., McLean, E.R., 2003. The DeLone and McLean Model of
Information Systems Success: A Ten-Year Update. J. Manag. Inf. Syst. 19, 9–30.
Eckhardt, A., Laumer, S., Weitzel, T., 2009. Who influences whom? Analyzing
There is no conflict of interest. workplace referents’ social influence on IT adoption and non-adoption.
J. Inf. Technol. 24, 11–24. http://dx.doi.org/10.1057/jit.2008.31.
References El Emam, K., Koru, A.G., 2008. A replicated survey of IT software project
failures. IEEE Softw. 25, 84–90.
Ferneley, E.H., Sobreperez, P., 2006. Resist, comply or workaround? An
Ahn, M.J., Zwikael, O., Bednarek, R., 2010. Technological invention to
examination of different facets of user engagement with information
product innovation: A project management approach. Int. J. Proj. Manag.
systems. Eur. J. Inf. Syst. 15, 345–356. http://dx.doi.org/10.1057/palgrave.
28, 559–568. http://dx.doi.org/10.1016/j.ijproman.2009.11.001.
Aloini, D., Dulmin, R., Mininno, V., 2007. Risk management in ERP project ejis.3000629.
Fiedler, S., 2010. Managing resistance in an organizational transformation: A
introduction: Review of the literature. Inf. Manag. 44, 547–567. http://dx.
doi.org/10.1016/j.im.2007.05.004. case study from a mobile operator company. Int. J. Proj. Manag. 28,
Aloini, D., Dulmin, R., Mininno, V., 2012. Risk assessment in ERP projects. 370–383. http://dx.doi.org/10.1016/j.ijproman.2010.02.004.
Inf. Syst. 37, 183–199. http://dx.doi.org/10.1016/j.is.2011.10.001. Ford, J.D., Ford, L.W., D’Amelio, A., 2008. Resistance to change: the rest of
Altuwaijri, M.M., Khorsheed, M.S., 2011. InnoDiff: A project-based model for the story. Acad. Manag. Rev. 33, 362–377.
successful IT innovation diffusion. Int. J. Proj. Manag. 30, 37–47. http://dx. Freeman, R.E., 2010. Strategic management: A stakeholder approach.
doi.org/10.1016/j.ijproman.2011.04.007. Cambridge University Press, Cambridge, UK.
Atkinson, R., 1999. Project management: cost, time and quality, two best guesses Geraldi, J.G., Kutsch, E., Turner, N., 2011. Towards a conceptualisation of
and a phenomenon, its time to accept other success criteria. Int. J. Proj. quality in information technology projects. Int. J. Proj. Manag. 29,
Manag. 17, 337–342. http://dx.doi.org/10.1016/S0263-7863(98)00069-6. 557–567. http://dx.doi.org/10.1016/j.ijproman.2010.06.004.
Atkinson, R., Crawford, L., Ward, S., 2006. Fundamental uncertainties in Hartono, B., Sulistyo, S.R., Praftiwi, P.P., Hasmoro, D., 2014. Project risk:
projects and the scope of project management. Int. J. Proj. Manag. 24, Theoretical concepts and stakeholders’ perspectives. Int. J. Proj. Manag. 32,
687–698. http://dx.doi.org/10.1016/j.ijproman.2006.09.011. 400–411. http://dx.doi.org/10.1016/j.ijproman.2013.05.011.
Baccarini, D., Salm, G., Love, P.E.D., 2004. Management of risks in Hirschheim, R., Newman, M., 1988. Information Systems and User Resistance:
information technology projects. Ind. Manag. Data Syst. 104, 286–295. Theory and Practice. Comput. J. 31, 398–408.
http://dx.doi.org/10.1108/02635570410530702. Hong, K.-K., Kim, Y.-G., 2002. The critical success factors for ERP
Bandyopadhyay, K., Mykytyn, P.P., Mykytyn, K., 1999. A framework for implementation: an organizational fit perspective. Inf. Manag. 40, 25–40.
integrated risk management in information technology. Manag. Decis. 37, http://dx.doi.org/10.1016/S0378-7206(01)00134-3.
437–444. Hultman, K., 2003. Resistance to change, managing. In: Bidgoli, H. (Ed.),
Bannerman, P.L., 2008. Risk and risk management in software projects: A Encyclopedia of information systems. Academic Press, San Diego,
reassessment. J. Syst. Softw. 81, 2118–2133. http://dx.doi.org/10.1016/j.jss. pp. 693–705.
2008.03.059. ISO, 2009. ISO 31000:2009, risk management – principles and guidelines.
Bansler, J.P., Havn, E., 2004. Exploring the role of network effects in IT International Standards Organisation, Geneva.
implementation: The case of knowledge repositories. Inf. Technol. People Jiang, J.J., Muhanna, W.A., Klein, G., 2000. User resistance and strategies for
17, 268–285. http://dx.doi.org/10.1108/09593840410554184. promoting acceptance across system types. Inf. Manag. 37, 25–36. http://
Benaroch, M., Lichtenstein, Y., Robinson, K., 2006. Real options in dx.doi.org/10.1016/S0378-7206(99)00032-4.
information technology risk management: An empirical validation of risk- Joshi, K., 1991. A model of Users’ perspective on change: the case of
option relationships. MIS Q. 30, 827–864. information systems technology implementation. MIS Q. 15, 229–242.
Beringer, C., Jonas, D., Kock, A., 2013. Behavior of internal stakeholders in http://dx.doi.org/10.2307/249384.
project portfolio management and its impact on success. Int. J. Proj. Manag. Kappelman, L.A., McKeeman, R., Zhang, L., 2006. Early warning signs of IT
31, 830–846. http://dx.doi.org/10.1016/j.ijproman.2012.11.006. project failure: The dominant dozen. Inf. Syst. Manag. 23, 31–36. http://dx.
Bernroider, E.W.N., Wong, C.W.Y., Lai, K., 2014. From dynamic capabilities doi.org/10.1201/1078.10580530/46352.23.4.20060901/95110.4.
to ERP enabled business improvements: The mediating effect of the Keil, M., Cule, P.E., Lyytinen, K., Schmidt, R.C., 1998. A framework for
implementation project. Int. J. Proj. Manag. 32, 350–362. http://dx.doi.org/ identifying software project risks. Commun. ACM 41, 76–83.
10.1016/j.ijproman.2013.05.006. Kim, H.-W., 2011. The effects of switching costs on user resistance to
Chow, T., Cao, D.-B., 2008. A survey study of critical success factors in agile enterprise systems implementation. IEEE Trans. Eng. Manag. 58,
software projects. J. Syst. Softw. 81, 961–971. http://dx.doi.org/10.1016/j. 471–482.
jss.2007.08.020. Kim, H.-W., Kankanhalli, A., 2009. Investigating user resistance to information
Cule, P., Schmidt, R., Lyytinen, K., Keil, M., 2000. Strategies for Heading Off systems implementation: A status quo bias perspective. MIS Q. 33, 567–582.
is Project Failure. Inf. Syst. Manag. 17, 61–69. http://dx.doi.org/10.1201/ Kutsch, E., Hall, M., 2005. Intervening conditions on the management of
1078/43191.17.2.20000301/31229.8. project risk: Dealing with uncertainty in information technology projects.
Darke, P., Shanks, G., Broadbent, M., 1998. Successfully completing case Int. J. Proj. Manag. 23, 591–599. http://dx.doi.org/10.1016/j.ijproman.
study research: combining rigour, relevance and pragmatism. Inf. Syst. J. 8, 2005.06.009.
273–289. http://dx.doi.org/10.1046/j.1365-2575.1998.00040.x. Kwahk, K.-Y., Kim, H.-W., 2007. Managing readiness in enterprise systems-
De Bakker, K., Boonstra, A., Wortmann, H., 2010. Does risk management driven organizational change. Behav. Inf. Technol. 27, 79–87. http://dx.doi.
contribute to IT project success? A meta-analysis of empirical evidence. Int. org/10.1080/01449290701398475.
J. Proj. Manag. 28, 493–503. http://dx.doi.org/10.1016/j.ijproman.2009.07. Kwan, T.W., Leung, H.K.N., 2011. A risk management methodology for
002. project risk dependencies. IEEE Trans. Softw. Eng. 37, 635–648. http://dx.
De Bakker, K., Boonstra, A., Wortmann, H., 2011. Risk management affecting doi.org/10.1109/TSE.2010.108.
IS/IT project success through communicative action. Proj. Manag. J. 42, Lapointe, L., Rivard, S., 2005. A multilevel model of resistance to information
75–90. http://dx.doi.org/10.1002/pmj.20242. technology implementation. MIS Q. 29, 461–491.
De Bakker, K., Boonstra, A., Wortmann, H., 2012. Risk managements’ Laumer, S., 2011. Why Do people reject technologies – a literature-based
communicative effects influencing IT project success. Int. J. Proj. Manag. discussion of the phenomena “resistance to change”. ECIS 2011
30, 444–457. http://dx.doi.org/10.1016/j.ijproman.2011.09.003. Proceedings. Information Systems and Managerial Psychology Research.
de Carvalho, M.M., Rabechini Junior, R., 2015. Impact of risk management on Lavbič, D., Vasilecas, O., Rupnik, R., 2010. Ontology-based multi-agent
project performance: the importance of soft skills. Int. J. Prod. Res. 53, system to support business users and management. Technol. Econ. Dev.
321–340. http://dx.doi.org/10.1080/00207543.2014.919423. Econ. 16, 327–347. http://dx.doi.org/10.3846/tede.2010.21.
1272 S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273

Lawrence, P.R., 1954. How to deal with resistance to change. Harv. Bus. Rev. Saunders, F.C., Gale, A.W., Sherry, A.H., 2015. Conceptualising uncertainty in
32, 49–57. safety-critical projects: A practitioner perspective. Int. J. Proj. Manag. 33,
Lewin, K., 1947. Frontiers in group dynamics: concept method and reality in 467–478.
social science; social equilibria and social change. Hum. Relations 1, 5–41. Schmidt, R., Lyytinen, K., Keil, M., Cule, P., 2001. Identifying software project
http://dx.doi.org/10.1177/001872674700100103. risks: an international Delphi study. J. Manag. Inf. Syst. 17, 5–36.
Li, Y., Yang, M.-H., Klein, G., Chen, H.-G., 2011. The role of team problem Sharma, A., Gupta, A., 2012. Impact of organisational climate and
solving competency in information system development projects. Int. demographics on project specific risks in context to Indian software
J. Proj. Manag. 29, 911–922. http://dx.doi.org/10.1016/j.ijproman.2010.09. industry. Int. J. Proj. Manag. 30, 176–187. http://dx.doi.org/10.1016/j.
004. ijproman.2011.05.003.
Liu, S., Wang, L., 2014. Understanding the impact of risks on performance in Sigala, M., 2013. Examining the adoption of destination management systems:
internal and outsourced information technology projects: The role of An inter-organizational information systems approach. Manag. Decis. 51,
strategic importance. Int. J. Proj. Manag. 32, 1494–1510. http://dx.doi.org/ 1011–1036. http://dx.doi.org/10.1108/MD-11-2012-0800.
10.1016/j.ijproman.2014.01.012. Söderlund, J., Maylor, H., 2012. Project management scholarship: Relevance,
Long, S., Spurlock, D.G., 2008. Motivation and stakeholder acceptance in impact and five integrative challenges for business and management
technology-driven change management: implications for the engineering schools. Int. J. Proj. Manag. 30, 686–696. http://dx.doi.org/10.1016/j.
manager. Eng. Manag. J. 20, 30–36. ijproman.2012.03.007.
Lundy, V., Morin, P., 2013. Project leadership influences resistance to change: Tah, J.H.M., Carr, V., 2001. Knowledge-based approach to construction project
the case of the Canadian public service. Proj. Manag. J. 44, 45–64. http:// risk management. J. Comput. Civ. Eng. 15, 170–177.
dx.doi.org/10.1002/pmj.21355. Thamhain, H., 2013. Managing risks in complex projects. Proj. Manag. J. 44,
Marakas, G.M., Hornik, S., 1996. Passive resistance misuse: Overt support and 20–35. http://dx.doi.org/10.1002/pmj.21325.
covert recalcitrance in IS implementation. Eur. J. Inf. Syst. 5, 208–219. The Standish Group, 2013. CHAOS Manifesto 2013. Think big, act small.
http://dx.doi.org/10.1057/ejis.1996.26. Tiwana, A., Keil, M., 2004. The one-minute risk assessment tool. Commun.
Markelj, B., Bernik, I., 2014. Safe use of mobile devices arises from knowing the ACM 47, 73–77.
threats. J. Inf. Secur. Appl. http://dx.doi.org/10.1016/j.jisa.2014.11.001. Trkman, M., Trkman, P., 2009. A wiki as intranet: a critical analysis using the
Markus, M.L., 1983. Power, politics, and MIS implementation. Commun. ACM Delone and McLean model. Online Inf. Rev. 33, 1087–1102. http://dx.doi.
26, 430–444. org/10.1108/14684520911011025.
Martinko, M.J., Henry, J.W., Zmud, R.W., 1996. An attributional explanation Trkman, M., Trkman, P., 2014. Actors’ misaligned interests to explain the low
of individual resistance to the introduction of information technologies in impact of an information system – A case study. Int. J. Inf. Manag. 34,
the workplace. Behav. Inf. Technol. 15, 313–330. 296–307. http://dx.doi.org/10.1016/j.ijinfomgt.2013.10.004.
Meissonier, R., Houzé, E., 2010. Toward an “IT Conflict-Resistance Theory”: Van Offenbeek, M., Boonstra, A., Seo, D., 2013. Towards integrating
action research during IT pre-implementation. Eur. J. Inf. Syst. 19, acceptance and resistance research: evidence from a telecare case study.
540–561. http://dx.doi.org/10.1057/ejis.2010.35. Eur. J. Inf. Syst. 22, 434–454. http://dx.doi.org/10.1057/ejis.2012.29.
Molineux, J., 2013. Enabling organizational cultural change using systemic Vavpotič, D., Hovelja, T., 2012. Improving the evaluation of software
strategic human resource management – a longitudinal case study. Int. development methodology adoption and its impact on enterprise perfor-
J. Hum. Resour. Manag. 24, 1588–1612. http://dx.doi.org/10.1080/ mance. Comput. Sci. Inf. Syst. 9, 165–187. http://dx.doi.org/10.2298/
09585192.2012.723022. CSIS110503072V.
Nutt, P.C., 1998. Leverage, resistance and the success of implementation Vrhovec, S., Rupnik, R., 2011. A model for resistance management in IT
approaches. J. Manag. Stud. 35, 213–240. http://dx.doi.org/10.1111/1467- projects and programs. Electrotech. Rev. 78, 73–78.
6486.00091. Vrhovec, S.L.R., Trkman, M., Kumer, A., Krisper, M., Vavpotič, D., 2014.
Ocepek, U., Bosnić, Z., Šerbec, I.N., Rugelj, J., 2013. Exploring the Outsourcing as an economic development tool in transition economies:
relation between learning style models and preferred multimedia types. scattered global software development. Inf. Technol. Dev. http://dx.doi.org/
Comput. Educ. 69, 343–355. http://dx.doi.org/10.1016/j.compedu. 10.1080/02681102.2013.874316.
2013.07.029. Wallace, L., Keil, M., 2004. Software project risks and their effect on outcomes.
Oreg, S., 2003. Resistance to change: developing an individual differences Commun. ACM 47, 68–73.
measure. J. Appl. Psychol. 88, 680–693. http://dx.doi.org/10.1037/0021- Wallace, L., Keil, M., Rai, A., 2004. Understanding software project risk: a
9010.88.4.680. cluster analysis. Inf. Manag. 42, 115–125. http://dx.doi.org/10.1016/j.im.
Oreg, S., Vakola, M., Armenakis, A.A., 2011. Change Recipients’ 2003.12.007.
reactions to organizational change: a 60-year review of quantitative Yin, R.K., 2009. Case study research: design and methods. 4th ed. Sage
studies. J. Appl. Behav. Sci. 47, 461–524. http://dx.doi.org/10.1177/ Publications, Thousand Oaks, California http://dx.doi.org/10.1097/FCH.
0021886310396550. 0b013e31822dda9e.
Osipova, E., Eriksson, P.E., 2013. Balancing control and flexibility in joint risk Zander, A., 1950. Resistance to change – its analysis and prevention. Adv.
management: Lessons learned from two construction projects. Int. J. Proj. Manag. J. 15, 9–11.
Manag. 31, 391–399. http://dx.doi.org/10.1016/j.ijproman.2012.09.007. Žvanut, B., Pucer, P., Ličen, S., Trobec, I., Plazar, N., Vavpotič, D., 2011.
Pardo del Val, M., Martínez Fuentes, C., 2003. Resistance to change: a The effect of voluntariness on the acceptance of e-learning by nursing
literature review and empirical study. Manag. Decis. 41, 148–155. http://dx. students. Nurse Educ. Today 31, 350–355. http://dx.doi.org/10.1016/j.
doi.org/10.1108/00251740310457597. nedt.2010.07.004.
Piderit, S.K., 2000. Rethinking Resistance and Recognizing Ambivalence: A
Multidimensional View of Attitudes toward an Organizational Change.
Acad. Manag. Rev. 25, 783–794. http://dx.doi.org/10.2307/259206. Simon L. R. Vrhovec is PhD Student at University of Ljubljana. His research
Rivard, S., Lapointe, L., 2012. Information technology Implementers’ interests include software project management, stakeholder resistance to
responses to user resistance: nature and effects. MIS Q. 36, 897–920. change, agile methods, global software development, information security,
Rumelt, R.P., 1995. Inertia and transformation. In: Montgomery, C.A. (Ed.), and enterprise architecture.
Resources in an evolutionary perspective: towards a synthesis of
evolutionary and resource-based approaches to strategy. Kluwer Academic
Publishers, Norwell, Mass., pp. 101–132. Tomaž Hovelja is Assistant Professor at the Faculty of Computer and
Sanderson, J., 2012. Risk, uncertainty and governance in megaprojects: A Information Science at the University of Ljubljana. He received bachelor's
critical discussion of alternative explanations. Int. J. Proj. Manag. 30, degree, master’s degree and his PhD in Business Administration from the
432–443. http://dx.doi.org/10.1016/j.ijproman.2011.11.002. Economic Faculty at the University of Ljubljana. His research areas are social,
S.L.R. Vrhovec et al. / International Journal of Project Management 33 (2015) 1262–1273 1273

economic and organizational factors of IT deployment in enterprises and IT Marjan Krisper is Associate Professor at University of Ljubljana, Faculty of
projects success criteria. His research has appeared in journals such as Computer and Information Science. He received the MSc from University of
Technological and Economic Development of Economy, Journal of Systems Ljubljana, Slovenia, and the PhD from University of Belgrade, Yugoslavia. He
and Software, Computer Science and Information Systems, Economic and was Chair of Information Science and Head of Information Systems Laboratory
Business Review for Central and South-Eastern Europe and others. at University of Ljubljana, Faculty of Computer and Information Science. His
research interests include information systems, information systems develop-
ment methodologies, information systems strategic planning, enterprise
Damjan Vavpotič is Assistant Professor at the Faculty of Computer and architecture and electronic business. He is a charter member of Association
Information Science at the University of Ljubljana and a member of the for Information Systems and a member of Slovenian Informatics Society.
Information Systems Laboratory at the same university. His research interests
include information systems development methodologies, IS methodology
evaluation and adoption, and evaluation of e-learning and IT in pedagogical
processes. His research has appeared in journals such as Information and
Software Technology, Nurse Education Today, Informatica, Computer Science
and Information Systems, Electronics and Electrical Engineering, and in
proceedings of many international conferences.

You might also like