Skip to main content

Advertisement

Log in

How lecturers neutralize resistance to the implementation of learning management systems in higher education

  • Published:
Journal of Computing in Higher Education Aims and scope Submit manuscript

Abstract

The aim of the study was to investigate neutralisation techniques used by lecturers to justify their resistance behaviours during the implementation of learning management systems (LMS) in higher educational institutions (HEIs). Moreover, we explored why lecturers employed such neutralisation techniques to justify their resistance behaviours. A number of studies identified resistance as a barrier to successful implementation of technology in HEIs. However, there is a dearth of literature on the choice of neutralisation techniques employed by lecturers to justify such resistance behaviours. Understanding the logic behind the choice of neutralisation techniques could ensure effective management strategies towards user resistance, which could further assist to improve technology uptake in HEIs. The study draws from Bourdieu’s theory of practice (ToP) as a lens to investigate the logic behind the use of certain neutralisation techniques to justify user resistance. The research used cross-sectional data from semi-structured interviews and participant observations of a single in-depth case setting. The most common neutralisation technique used by lecturers was condemn the condemners followed by denial of responsibility, denial of injury, and appeal to higher loyalties. Findings suggest that the habitus and capital of lecturers significantly influence the choice of techniques to justify resistance. Lecturers tended to neutralise before they resisted, such that they prepared themselves to justify any deviance well in advance in case they got caught. Integration of ToP and Neutralisation theory enriches theorisation of user resistance, enabling development of mechanisms that could effectively manage lecturer resistance behaviours to improve uptake of LMS in HEIs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Albugami, S., & Ahmed, V. (2015). Success factors for ICT implementation in Saudi secondary schools: From the perspective of ICT directors, head teachers, teachers and students. International Journal of Education and Development Using Information and Communication Technology,11(1), 36–54.

    Google Scholar 

  • Al-Busaidi, K. A., & Al-Shihi, O. H. (2012). Critical factors influencing instructor’s acceptance and use of learning management systems. In R. Babo & A. Azevedo (Eds.), Higher education institutions and learning management systems: Adoption and standardization (pp. 116–141). Hershey: Information Science Reference.

    Chapter  Google Scholar 

  • AlQudah, A. A. (2014). Accepting Moodle by academic staff at the University of Jordan: Applying and extending TAM in technical support factors. European Scientific Journal,10(18), 183–200.

    Google Scholar 

  • Auriacombe, C., & Mouton, J. (2007). Qualitative field research. Journal of Public Administration,42(6), 441–457.

    Google Scholar 

  • Bagayogo, F., Beaudry, A., & Lapointe, L. (2013). Impacts of IT acceptance and resistance behaviors: A novel framework. In Proceedings of the 34th international conference on information systems, Milan, Italy.

  • Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2013). Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Computers and Security,39, 145–159.

    Article  Google Scholar 

  • Blin, F., & Munro, M. (2008). Why hasn’t technology disrupted academics’ teaching practices? Understanding resistance to change through the lens of activity theory. Computers & Education,50(2), 475–490.

    Article  Google Scholar 

  • Bourdieu, P. (1977). Outline of a theory of practice. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Bourdieu, P. (1984). Distinction: A social critique of the judgement of taste. Cambridge: Havard University Press.

    Google Scholar 

  • Bourdieu, P. (1986). The forms of capital handbook of theory and research for the sociology of education. In R. A. Caro (Ed.), The power broker: Robert Moses and the fall of New York (pp. 241–258). New York: Alfred A Knopf Incorporated.

    Google Scholar 

  • Bourdieu, P. (1990). The logic of practice. California: Stanford University Press.

    Google Scholar 

  • Bourdieu, P., & Wacquant, L. (1992). An invitation to reflexive sociology. Chicago: Chicago University Press.

    Google Scholar 

  • Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology,3(2), 77–101.

    Article  Google Scholar 

  • Canchu, L., Singer, R., & Ha, L. (2010). Why university members use and resist technology? A structure enactment perspective. Journal of Computing in Higher Education,22(1), 38–59.

    Article  Google Scholar 

  • Cole, J., & Foster, H. (2007). Using Moodle: Teaching with the popular open source course management system (2nd ed.). Newton: O’Reilly Media Inc.

    Google Scholar 

  • Costello, E. (2013). Opening up to open source: Looking at how moodle was adopted in higher education. Open Learning,28(3), 187–200.

    Article  Google Scholar 

  • Cromwell, P., & Thurman, Q. (2003). The devil made me do it: Use of neutralizations by shoplifters. Deviant Behavior,24(6), 535–550.

    Article  Google Scholar 

  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly,13(3), 319.

    Article  Google Scholar 

  • Garg, A., Shukla, B., & Kendall, G. (2015). Barriers to implementation of IT in educational institutions. The International Journal of Information and Learning Technology,32(2), 94–108.

    Article  Google Scholar 

  • Garrett, D. E., Bradford, J. L., Meyers, R. A., Becker, J., Garrett Jeffrey, L., Bradford Ren, D. E., et al. (1989). Issues management and organizational accounts: An analysis of corporate responses to accusations of unethical business practices. Journal of Business Ethics,8(7), 507–520.

    Article  Google Scholar 

  • Grenfell, M. (2008). Pierre Bourdieu: Key concepts. Stockfield: Acumen Publishing Limited.

    Google Scholar 

  • Grenfell, M., & James, D. (1998). Bourdieu and education: Acts of practical theory. London: Falmer Press.

    Google Scholar 

  • Haag, S., & Eckhardt, A. (2015). Justifying shadow IT usage. In Pacific Asia conference on information systems proceedings (p. 241).

  • Harris, L. C., & Daunt, K. L. (2011). Deviant customer behaviour: A study of techniques of neutralisation. Journal of Marketing Management,27(7–8), 834–853.

    Article  Google Scholar 

  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology,9(3), 187–204.

    Article  Google Scholar 

  • Hon, A. H. Y., Bloom, M., & Crant, J. M. (2014). Overcoming resistance to change and enhancing creative performance. Journal of Management,40(3), 919–941.

    Article  Google Scholar 

  • Howard, S. K. (2013). Risk-aversion: Understanding teachers’ resistance to technology integration. Technology, Pedagogy and Education,22(3), 357–372.

    Article  Google Scholar 

  • Ignatow, G., & Robinson, L. (2017). Pierre Bourdieu: Theorizing the digital. Information, Communication & Society,20(7), 950–966.

    Article  Google Scholar 

  • ITU. (2017). ICT facts and figures 2017. International Telecommunication Union. https://doi.org/10.1787/9789264202085-5-en.

    Article  Google Scholar 

  • Joshi, K. (1991). A model of user’s perspective on change: The case of information systems technology implementation. MIS Quarterly,15(2), 229–242.

    Article  Google Scholar 

  • Klockars, C. B. (1974). The professional fence. New York: Free Press.

    Google Scholar 

  • Lapointe, L., & Rivard, S. (2005). A multilevel model of resistance to information technology implementation. MIS Quarterly,29(3), 461–491.

    Article  Google Scholar 

  • Laumer, S. (2011). Why do people reject technologies—A literature-based discussion of the Phenomena “Resistance to Change” in information systems and managerial psychology research. In Proceedings of the European conference on information systems. Retrieved August 14, 2017 from https://aisel.aisnet.org/ecis2011/60.

  • Lee, A. S., & Baskerville, R. L. (2003). Generalizing generalizability in information systems research. Information Systems Research,14(3), 221–243.

    Article  Google Scholar 

  • Liddick, D. (2013). Techniques of neutralization and animal rights activists. Deviant Behavior,34(8), 618–634.

    Article  Google Scholar 

  • Lin, T., Huang, S., & Chiang, S. (2018). User resistance to the implementation of information systems: A psychological contract breach perspective. Journal of the Association for Information Systems,19(4), 306–332.

    Article  Google Scholar 

  • Mahmud, I., Ramayah, T., & Kurnia, S. (2017). To use or not to use: Modelling end user grumbling as user resistance in pre-implementation stage of enterprise resource planning system. Information Systems,69, 164–179.

    Article  Google Scholar 

  • Marakas, G. M., & Hornik, S. (1996). Passive resistance misuse: Overt support and covert recalcitrance in IS implementation. European Journal of Information Systems,5(3), 208–219.

    Article  Google Scholar 

  • Markus, M. L. (1983). Power, politics, and MIS implementation. Communications of the ACM,26(6), 430–444.

    Article  Google Scholar 

  • Martín-Blas, T., & Serrano-Fernández, A. (2009). The role of new technologies in the learning process: Moodle as a teaching tool in physics. Computers & Education,52(1), 35–44.

    Article  Google Scholar 

  • Minor, W. W. (1981). Techniques of neutralization: A reconceptualization and empirical examination. Journal of Research in Crime and Deliquency,18(2), 295–318.

    Article  Google Scholar 

  • Mutch, C. (2006). Adapting Bourdieu’s field theory to explain decision-making processes in educational policy. In V. A. Anfara Jr. & N. T. Mertz (Eds.), Theoretical frameworks in qualitative research (Vol. 1, pp. 155–174). Thousand Oaks: Sage.

    Google Scholar 

  • Myers, M. D., & Newman, M. (2007). The qualitative interview in IS research: Examining the craft. Information and Organization,17(1), 2–26.

    Article  Google Scholar 

  • Nawaz, A. (2013). Using e-learning as a tool for ‘education for all’ in developing states. International Journal of Science and Technology,4(3), 38–46.

    Google Scholar 

  • Orlikowski, W. (2000). Using technology and constituting structures: A practice lens for studying technology in organizations. Organization Science,11(4), 404–428.

    Article  Google Scholar 

  • Piquero, N. L., Tibbetts, S. G., & Blankenship, M. B. (2005). Examining the role of differential association and techniques of neutralization in explaining corporate crime. Deviant Behavior,26(2), 159–188.

    Article  Google Scholar 

  • Rogers, E. M. (1962). Diffusion of innovations (1st ed.). New York: The Free Press.

    Google Scholar 

  • Sakala, L., & Chigona, W. (2017). Lecturer resistance during ICTs implementation in higher education in Zimbabwe: Forms and triggers. In Proceedings of the South African institute of computer scientists and information technologists (p. 31). ACM.

  • Samhan, B. (2018). Revisiting technology resistance: current insights and future directions. Australasian Journal of Information Systems,22, 1–11.

    Article  Google Scholar 

  • Schultze, U., & Boland, R., Jr. (2000). Place, space and knowledge work: A study of outsourced computer systems administrators. Accounting, Management and Information Technologies,10(3), 187–219.

    Article  Google Scholar 

  • Seale, C. (1999). Quality in qualitative research. Qualitative Inquiry,5(4), 465–478.

    Article  Google Scholar 

  • Selander, L., & Henfridsson, O. (2012). Cynicism as user resistance in IT implementation. Information Systems Journal,22(4), 289–312.

    Article  Google Scholar 

  • Sinkovics, R. R., Penz, E., & Ghauri, P. N. (2008). Enhancing the trustworthiness of qualitative research in international business. Management International Review,48(6), 689–714.

    Article  Google Scholar 

  • Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly-Special Issue,34(3), 487–502.

    Google Scholar 

  • Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management,49(7–8), 334–341.

    Article  Google Scholar 

  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Association,22(6), 664–670.

    Google Scholar 

  • Vinthagen, S., & Johansson, A. (2013). “Everyday resistance”: Exploration of a concept and its theories. Resistance Studies Magazine,1(1), 1–46.

    Google Scholar 

  • Walsham, G. (1995). Interpretive case studies in IS research: Nature and method. European Journal of Information Systems,4(2), 74–81.

    Article  Google Scholar 

  • Watty, K., McKay, J., & Ngo, L. (2016). Innovators or inhibitors? Accounting faculty resistance to new educational technologies in higher education. Journal of Accounting Education,36, 1–15.

    Article  Google Scholar 

  • Willison, R., & Warkentin, M. (2013). Beyond deterrence: An expanded view of employee computer abuse. MIS Quarterly,37(1), 1–20.

    Article  Google Scholar 

  • World Economic Forum. (2015). The global information technology report 2015. World Economic Forum. https://doi.org/10.3359/oz0304203.

    Article  Google Scholar 

  • Yin, R. K. (2013). Analysing case study evidence—How to start your analysis, your analytic choices and how they work. In R. K. Yin (Ed.), Case study research: Design and methods (pp. 127–164). Thousand Oaks: Sage.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lucy Charity Sakala.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sakala, L.C., Chigona, W. How lecturers neutralize resistance to the implementation of learning management systems in higher education. J Comput High Educ 32, 365–388 (2020). https://doi.org/10.1007/s12528-019-09238-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12528-019-09238-7

Keywords

Navigation