Repairing Organizational Legitimacy Following Information Technology (IT) Material Weaknesses: Executive Turnover, IT Expertise, and IT System Upgrades: Executive turnover, IT expertise, and IT system upgrades

Jacob Haislip, Adi Masli, Vernon Richardson, Juan Manuel Sanchez

Research output: Contribution to journalArticlepeer-review

41 Scopus citations

Abstract

Since Information Technology (IT)-based internal controls are pivotal in providing access to, and security of, financial records, we argue that an IT-related material weakness (ITMW) is a significant threat to organizational legitimacy. Prior research suggests that firms work to repair legitimacy by disassociation with executives blamed for the deficiency and the establishment of a monitoring mechanism to ensure the problem is addressed (Suchman 1995). As a test of disassociation, we find that, relative to a propensity-score-matched sample of non-ITMW firms, ITMW firms experience higher CEO, CFO, and director turnover. As a test of the establishment of a monitoring mechanism to repair organizational legitimacy, we find that ITMW firms hire CEOs, CFOs, and directors with higher levels of IT expertise, and make significant IT system upgrades. We find evidence that ITMW firms remediate deficiencies in a more timely fashion when they appoint a new CFO with IT expertise or upgrade their financial reporting system. Collectively, our results suggest that firms make significant monitoring changes to reestablish organizational legitimacy after receiving an ITMW.

Original languageEnglish
Pages (from-to)41 - 70
Number of pages30
JournalJournal of Information Systems
Volume30
Issue number1
DOIs
StatePublished - Mar 1 2016

Keywords

  • Corporate governance
  • Information technology
  • Internal control material weakness

Fingerprint

Dive into the research topics of 'Repairing Organizational Legitimacy Following Information Technology (IT) Material Weaknesses: Executive Turnover, IT Expertise, and IT System Upgrades: Executive turnover, IT expertise, and IT system upgrades'. Together they form a unique fingerprint.

Cite this