« L'adoption du vote par Internet aux assemblées générales des actionnaires de sociétés cotées en France : une perspective institutionnaliste, Systèmes d'Information et Management, vol.16, 2011. ,
« The Institutional Nature of ICT and Organizational Change, Information Systems and Global Diversity, pp.23-49, 2003. ,
, Theory of Workarounds, vol.34, pp.1041-1066, 2014.
A Model of Creativity and Innovation in Organizations, Research in Organizational Behavior, vol.22, 2000. ,
Shadow systems: The good, the bad and the ugly, Communications of the ACM, vol.52, issue.2, pp.124-129, 2009. ,
Introduction to Qualitative Research Method -A Phenomenological Approach to the Social Sciences, 1974. ,
« Raisons pratiques : sur la théorie de l'action, vol.251, 1994. ,
Central IT or Shadow IT? Factors Shaping Users' Decision to Go Rogue with IT, Proceedings of the 35th International Conference on Information Systems, 2014. ,
« Shadow IT : De la menace à l'opportunité, 2013. ,
Isomorphism in context: The power and prescription of institutional norms, 1997. ,
« Logique, épistémologie et méthodologie en sciences de gestion », cahier de recherche, DMSP, 1999. ,
Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Quarterly, pp.319-340, 1989. ,
Measuring the unmeasured: An institutional entrepreneur strategy in an emerging industry, 2004. ,
Does isomorphism legitimate?, 1996. ,
Organizational legitimacy, The Sage Handbook of Organizational Institutionalism, pp.1-42, 2017. ,
The iron cage revisited: institutional isomorphism and collective rationality in organizational field, American Sociological Review, vol.48, issue.2, pp.147-160, 1983. ,
Interest and agency in institutional theory". Institutional patterns and organizations, Culture and Environment, vol.1, pp.3-21, 1988. ,
Organizational legitimacy: Social values and organizational behavior, Pacific Sociological Review, vol.18, pp.122-136, 1975. ,
Social Skill and Institutional Theory, American Behavioral Scientist, vol.40, issue.4, pp.397-405, 1997. ,
Fields, Power and Social Skill: a Critical Analysis old the New Institutionalism, 1998. ,
The Transformation of Corporate Control, 1990. ,
Shadow IT Systems: Discerning the good and the evil, Proceedings of Twenty Second European Conference on Information Systems, 2014. ,
Institutional Change and Healthcare Organizations: From Professional Dominance to Managed Care, Administrative Science Quarterly, vol.47, issue.2, p.384, 2002. ,
Crocodiles in the Regulatory Swamp: Navigating the Dangers of Outsourcing, SaaS and Shadow IT, ICIS 2015 Proceedings, 2015. ,
Exploring the Shadows: IT Governance Approaches to User-Driven Innovation, Proceedings of the 20th European Conference on Information Systems, 2012. ,
Normalizing the Shadows -The Role of Symbolic Models for Individuals' Shadow IT Usage, Proceedings of the 35th International Conference on Information Systems, 2014. ,
Organizational cloud service adoption: a scientometric and content-based literature analysis, Journal of Business Economics, vol.84, pp.407-440, 2014. ,
Are shadow system users the better IS users? -Insights of a lab experiment, Thirty Sixth International Conference on Information Systems, 2015. ,
A Risk and Control-Oriented Study of the Practices of Spreadsheet Application Developers, Proceedings of the 29th Hawaii International Conference on System Sciences, pp.364-373, 1996. ,
Follow the Leader: Mimetic Isomorphism and Entry into New Markets, Administrative Science Quarterly, vol.38, issue.4, p.593, 1993. ,
The Relation of Shadow Systems and ERP Systems-Insights from a Multiple-Case Study, Systems, vol.4, p.11, 2016. ,
The Rise and Fall of a Shadow System: Lessons for Enterprise System Implementation, Proceedings of the 15th Australasian Conference on Information Systems, 2004. ,
Institutional Strategy, Journal of Management, vol.25, issue.2, pp.161-187, 1999. ,
A tale of two cities: Competing logics and practice variation in the professionalizing of mutual funds, vol.50, pp.289-307, 2007. ,
Institutional entrepreneurship in emerging fields: HIV/AIDS treatment advocacy in Canada, Academy of Management Journal, vol.47, pp.657-679, 2004. ,
Behavioral drivers behind shadow IT and its outcomes in terms of individual performance, Twenty-second Americas Conference on Information Systems, 2016. ,
Institutionalized Organizations: Formal Structure as Myth and Ceremony, American Journal of Sociology, vol.83, issue.2, pp.340-363, 1977. ,
The Social Construction of Organizational Knowledge: A Study of the Uses of Coercive, Mimetic, and Normative Isomorphism, Administrative Science Quarterly, vol.44, issue.4, p.653, 1999. ,
Strategic responses to institutional processes, The Academy of Management Review, vol.16, pp.145-179, 1991. ,
Are You Ready to Lose Control? A Theory on the Role of Trust and Risk Perception on Bring-Your-Own-Device Policy and Information System Service Quality, 23rd European Conference on Information Systems, 2015. ,
End user computing: The dark matter (and dark energy) of corporate IT, Journal of Organizational and End User Computing, vol.25, issue.3, pp.1-19, 2012. ,
Discourse or Institution? Institutional Theory and the Challenge of Critical Discourse Analysis. Debating Organization", Point-Counterpoint in Organization Studies, pp.220-231, 2003. ,
The organization of societal sector: proposition and early evidence, The new institutionalism in organizational analysis, pp.108-140, 1991. ,
Institutions and organizations, vol.2, 1995. ,
Institutions and organizations, Institutions and Organizations: Ideas and Interests, p.282, 2001. ,
Shadow IT-A view from behind the curtain, Computers & Security, vol.45, pp.274-283, 2014. ,
Influence of Shadow IT on Innovation in Organizations, Complex Systems Informatics and Modeling Quarterly, pp.68-80, 2016. ,
Factors Influencing Non-Compliance Behavior towards Information Security Policies, International Conference on Information Resources Management, 2012. ,
Managing Legitimacy: Strategic and Institutional Approaches, 1995. ,
Dilemmas in Enterprise Architecture Research and Practice from a Perspective of Feral Information Systems, EDOCW 2013 Proceedings, 2013. ,
The Institutionalization of Institutional Theory, 1996. ,
User acceptance of information technology: toward a unified view, MIS Quarterly, vol.27, pp.425-478, 2003. ,
Case study research, design and methods, vol.5, 2003. ,
Beyond survival: Achieving new venture growth by building legitimacy, vol.27, pp.414-431, 2002. ,
On the Emergence of Shadow IT-A Transaction CostBased Approach, Proceedings of the 22 nd European Conference on Information Systems, 2014. ,
A Multiple Case Study on the Nature and Management of Shadow Information Technology, Journal of Information Systems: Spring 2017, vol.31, pp.79-101, 2017. ,