If they can’t adapt it to the way they need to work, they simply won’t bother using it. They can always get the job done some other way, maybe using their discretionary spending limits to sneak non-standard systems and applications into their workgroup. They know that, sooner or later, someone from on high will notice no one’s using the old system and it’ll quietly get junked.
That’s how users assert their influence.
Read this item from ZDNet’s Software and Services Blog