@inproceedings{9c40b01fc3b148eb8bad824e15f9ad73,
title = "The impact of social constructivism on ERP systems security: A critical social review",
abstract = "Little is understood about the effects of social constructivism that shapes conflicting concerns regarding Enterprise Resource Planning (ERP) security and usability during implementation. This work looks at social constructivism as produced and reproduced by stakeholders in the ERP systems implementation phase. Social constructivism is characterised by the embedded trade-off for usability, espoused by end-user and security, espoused by developers. Social constructivism was conceptualised qualitatively from a selected case study. Critical Social Theory (CST) was used as the theoretical lens. Stakeholders concerned with ERP security aspects in the implementation phase were interviewed and data transcribed and interpreted. Hermeneutical interpretation was applied towards understanding social constructivism. Exegesis techniques used include textual criticism and reduction criticism. The contribution of the work is twofold: the work provides insights regarding ERP systems security by attempting to explain how social constructivism shapes outcomes of ERP security; the article also shows how hermeneutics could be applied in the discipline of information systems security. Findings for this case reveal that social constructivism does shape ERP security in insightful ways.",
keywords = "ERP systems, Security, Social constructivism, Usability",
author = "Kennedy Njenga",
note = "Publisher Copyright: {\textcopyright} 2014, Edith Cowan University. All rights reserved.; 12th Australian Information Security Management Conference, AISM 2014 ; Conference date: 01-12-2014 Through 03-12-2014",
year = "2014",
doi = "10.4225/75/57b65e7b343d2",
language = "English",
series = "Proceedings of 12th Australian Information Security Management Conference, AISM 2014",
publisher = "Edith Cowan University",
pages = "39--47",
editor = "Mike Johnstone",
booktitle = "Proceedings of 12th Australian Information Security Management Conference, AISM 2014",
}