Essays on legitimacy in the information systems context
The first essay focuses on technology firms in the sharing economy and attempts to enrich our understanding of actions organizations take to gain legitimacy in this specific context. I draw upon literature in institutional theory that explains legitimacy and legitimation. News stories about one s...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Doctor of Philosophy |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/146203 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-146203 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1462032024-01-12T10:17:32Z Essays on legitimacy in the information systems context Faheem Ahmed Shaikh Damien Joseph Nanyang Business School ADJOSEPH@ntu.edu.sg Business::Information technology::Management of information systems The first essay focuses on technology firms in the sharing economy and attempts to enrich our understanding of actions organizations take to gain legitimacy in this specific context. I draw upon literature in institutional theory that explains legitimacy and legitimation. News stories about one sharing economy organization’s actions are used to construct a typology of legitimation strategies from the ground up. The literature review and bringing together of theoretical legitimation strategies in itself can potentially help future research on legitimation. The operationalization of these strategies in practice in the sharing economy context contributes to literature in information systems. The second essay focuses on legitimacy repair following a data breach. Legitimacy issues arise when audiences probe an organization’s behavior during crisis events. A data breach is one such crisis event. A data breach might lead to unauthorized access of private individual data that might be put to illicit use, increasing the potential for harm. Since internal security practices are a mystery to external stakeholders, the firm is subjected to scrutiny, raising questions about its security practices. Given the negative repercussions that a firm might face, I examine whether subsequent positive actions can serve to mitigate them. Using data from a well-known repository of data breaches and news of firm actions following a breach, I find that positive sentiment about security practices in news media helps to lower market repercussions. Doctor of Philosophy 2021-02-01T13:30:48Z 2021-02-01T13:30:48Z 2021 Thesis-Doctor of Philosophy Faheem Ahmed Shaikh. (2021). Essays on legitimacy in the information systems context. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/146203 10.32657/10356/146203 en This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Business::Information technology::Management of information systems |
spellingShingle |
Business::Information technology::Management of information systems Faheem Ahmed Shaikh Essays on legitimacy in the information systems context |
description |
The first essay focuses on technology firms in the sharing economy and attempts to
enrich our understanding of actions organizations take to gain legitimacy in this specific
context. I draw upon literature in institutional theory that explains legitimacy and
legitimation. News stories about one sharing economy organization’s actions are used to
construct a typology of legitimation strategies from the ground up. The literature review and
bringing together of theoretical legitimation strategies in itself can potentially help future
research on legitimation. The operationalization of these strategies in practice in the sharing
economy context contributes to literature in information systems.
The second essay focuses on legitimacy repair following a data breach. Legitimacy
issues arise when audiences probe an organization’s behavior during crisis events. A data
breach is one such crisis event. A data breach might lead to unauthorized access of private
individual data that might be put to illicit use, increasing the potential for harm. Since internal
security practices are a mystery to external stakeholders, the firm is subjected to scrutiny,
raising questions about its security practices. Given the negative repercussions that a firm
might face, I examine whether subsequent positive actions can serve to mitigate them. Using
data from a well-known repository of data breaches and news of firm actions following a
breach, I find that positive sentiment about security practices in news media helps to lower
market repercussions. |
author2 |
Damien Joseph |
author_facet |
Damien Joseph Faheem Ahmed Shaikh |
format |
Thesis-Doctor of Philosophy |
author |
Faheem Ahmed Shaikh |
author_sort |
Faheem Ahmed Shaikh |
title |
Essays on legitimacy in the information systems context |
title_short |
Essays on legitimacy in the information systems context |
title_full |
Essays on legitimacy in the information systems context |
title_fullStr |
Essays on legitimacy in the information systems context |
title_full_unstemmed |
Essays on legitimacy in the information systems context |
title_sort |
essays on legitimacy in the information systems context |
publisher |
Nanyang Technological University |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/146203 |
_version_ |
1789483013166333952 |