scholarly journals The role of economic evaluation in the decision-making process of family physicians: design and methods of a qualitative embedded multiple-case study

2009 ◽  
Vol 10 (1) ◽  
Author(s):  
Chantale Lessard ◽  
André-Pierre Contandriopoulos ◽  
Marie-Dominique Beaulieu
2015 ◽  
Vol 4 (1) ◽  
Author(s):  
Willy Hoppe de Sousa ◽  
Maria Cecília Galante Porto ◽  
Maria Isabel Palmeiro Marcatonio ◽  
Pedro Issao Takenouchi ◽  
Abraham Sin Oih Yu

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Chiara Crovini ◽  
Gabriele Santoro ◽  
Giovanni Ossola

PurposeThe main purpose of this study is twofold: first, to analyze how risk is considered and managed by entrepreneurial SMEs, where the original founder is still the entrepreneur running the business, and second to understand if risk management is integrated with decision making.Design/methodology/approachThis research is based on a multiple case study. Three entrepreneurial SMEs based in the North-West of Italy were selected to obtain a heterogeneous sample. They operate in the manufacturing sector and they have different size and corporate ownership.FindingsThe risk management process cannot be always formalized but an unconscious risk analysis is always carried out. Risk is intertwined with decision and entrepreneurial orientation. Nowadays, rethinking risk management means enhancing and improving the decision-making process and integrating the phases of the two processes by introducing an alternative new model (RM-DM) that stands for “risk management-decision making”.Research limitations/implicationsConclusions can be generalized at a theoretical level even though this multiple case study represents a contingent analysis.Practical implicationsThis research enhances the understanding of the potential benefits for entrepreneurial SME owners of a risk mind-set while making decisions. RM-DM model is an alternative tool to manage risks properly in SMEs, especially when a formalized process is not implemented, as it improves the way decisions are made and introduces a more reasoned approach to manage risks.Originality/valueThis empirical study introduces a unique model (RM-DM) that helps to rethink risk management in entrepreneurial SMEs, by integrating it with the decision making and by proposing an alternative tool to manage risks with a more structured approach.


2020 ◽  
Vol 1 (3) ◽  
pp. 103-132
Author(s):  
Rungamirai Matiure ◽  
Erick Nyoni

This study explored the utility of the learner autonomy concept in the Zimbabwean O Level English as a Second Language (ESL) classroom focusing on three Gweru urban high schools of the Midlands Province. The researchers intended to establish whether learner autonomy was a reality or just a myth in Zimbabwean classrooms. A qualitative multiple case study design was applied focusing on teaching strategies, availability of resources, challenges faced and ways of optimising it. Questionnaires and document analysis were used for data collection. The findings revealed that the concept did not manifest in explicit terms, the learners did not participate in decision making, and the teachers were not adequately prepared to administer autonomous processes with students. For it to be a reality, the Education Ministry is recommended to establish a comprehensive framework of how autonomous learning should be implemented. Teacher training should explicitly focus on how to develop autonomous learners. Teachers ought to be flexible enough to accommodate learners' contributions towards their learning.


Author(s):  
Mor Hodaya Or ◽  
Izhak Berkovich

Despite the popularity of distributed leadership theory, the investigation of the micro-political aspects of such models have scarcely been explored, and insights on the cultural variety of distributed practices in schools are limited. The present study aimed to explore what micro-political aspects emerge in participative decision making in collectivist and individualist cultures. To this end, a multiple case study method was adopted, focusing on four Israeli public high schools. Schools were chosen to represent an ‘extreme’ case selection rationale: two non-religious urban schools representing individualist cases, and two communal schools in religious kibbutzim representing communal schools. The analysis shed light on three micro-political points of comparison between the prototypes of participative decision making in collectivist and individualist cultures related to control, actors, and stage crafting. The findings and implications are discussed.


2006 ◽  
Vol 10 (4) ◽  
pp. 249-267 ◽  
Author(s):  
Tomi Ventovuori

The aim of this paper is to identify the different elements of the sourcing strategy decision‐making process and to clarify what are the factors that lead to the selection of a certain sourcing strategy in FM services. The study is based on a literature review and a multiple case study, which was conducted with four organizations representing different types of FM service clients. To find the optimal sourcing strategy and understand the consequences of different sourcing options, five decision categories must be analysed: sourcing interface, organizational decision‐making, the scope of service package, the geographical area of sourcing and relationship type. There are also some other elements that must be taken into account in the process of sourcing strategy development such as different elements of business in general and the prevailing market conditions. It is strongly suggested that companies could apply the presented integrated approach as a starting point for the development of sourcing strategies in FM services. In addition, this study shows that companies should view the development of sourcing strategies as an important phase of the procurement cycle.


2018 ◽  
Vol 64 (4) ◽  
pp. 810-854 ◽  
Author(s):  
Susan L. Cohen ◽  
Christopher B. Bingham ◽  
Benjamin L. Hallen

Using a nested multiple-case study of participating ventures, directors, and mentors of eight of the original U.S. accelerators, we explore how accelerators’ program designs influence new ventures’ ability to access, interpret, and process the external information needed to survive and grow. Through our inductive process, we illuminate the bounded-rationality challenges that may plague all ventures and entrepreneurs—not just those in accelerators—and identify the particular organizational designs that accelerators use to help address these challenges, which left unabated can result in suboptimal performance or even venture failure. Our analysis revealed three key design choices made by accelerators—(1) whether to space out or concentrate consultations with mentors and customers, (2) whether to foster privacy or transparency between peer ventures participating in the same program, and (3) whether to tailor or standardize the program for each venture—and suggests a particular set of choices is associated with improved venture development. Collectively, our findings provide evidence that bounded rationality challenges new ventures differently than it does established firms. We find that entrepreneurs appear to systematically satisfice prematurely across many decisions and thus broadly benefit from increasing the amount of external information searched, often by reigniting search for problems that they already view as solved. Our study also contributes to research on organizational sponsors by revealing practices that help or hinder new venture development and to emerging research on the lean start-up methodology by suggesting that startups benefit from engaging in deep consultative learning prior to experimentation.


2016 ◽  
Vol 31 (1) ◽  
pp. 79-101 ◽  
Author(s):  
Stephan Zimmermann ◽  
Christopher Rentrop ◽  
Carsten Felden

ABSTRACT In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62 percent of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize the role of workarounds in business workgroups.


This chapter presents the outcome of two empirical research studies that assess the implementation and validation of the cybersecurity audit model (CSAM), designed as a multiple-case study in two different Canadian higher education institution. CSAM can be applied for undertaking cybersecurity audits in any organization or nation state in order to evaluate and measure the cybersecurity assurance, maturity, and cyber readiness. The architecture of CSAM is explained in central sections. CSAM has been examined, implemented, and established under three research scenarios: (1) cybersecurity audit of all model domains, (2) cybersecurity audit of numerous domains, and (3) a single cybersecurity domain audit. The chapter concludes by showing how the implementation of the model permits one to report relevant information for future decision making in order to correct cybersecurity weaknesses or to improve cybersecurity domains and controls; thus, the model can be implemented and sufficiently tested at any organization.


Sign in / Sign up

Export Citation Format

Share Document