scholarly journals The Generation of Qualitative Data in Information Systems Research: The Diversity of Empirical Research Methods

Author(s):  
Goldkuhl Göran
Author(s):  
M. Gordon Hunter

The purpose of this chapter is to provide the researcher, who already is inclined to apply qualitative research, with an overview of methods. A representative sample of qualitative research methods is presented, which may be employed when conducting information systems research. These methods include Action Research, Case Study, Ethnography, Grounded Theory, and Narrative Inquiry. Examples of these research methods are also included, which provide a description of the method and references to more detailed presentations. Researchers should thoroughly explore these methods and become fully cognizant of when to appropriately apply each method. It is important to ensure that the chosen method addresses the research questions and supports the research objectives.


2006 ◽  
pp. 487-499 ◽  
Author(s):  
Mykola Pechenizkiy ◽  
Seppo Puuronen ◽  
Alexey Tsymbal

2002 ◽  
Vol 16 (2) ◽  
pp. 97-116 ◽  
Author(s):  
Janet A. Samuels ◽  
Paul John Steinbart

The publication of the Spring 2001 issue marks the completion of the first 15 years of the Journal of Information Systems (JIS). This paper analyzes the content of articles published, the research methods used, the sources referenced, and impact of articles published in JIS. The analyses provide insights concerning the development of accounting information systems research that should be of interest not only to readers of and contributors to JIS, but also to current and prospective doctoral students who are interested in the field of accounting information systems. Accounting researchers specializing in other disciplines may also find this paper beneficial in understanding the research interests of their accounting information systems colleagues.


Corruptio ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 107
Author(s):  
Laura Naomi Rotua Gultom

The Whistleblower and Justice Collaborator play a role in facilitating the disclosure of criminal acts of corruption, because none other than people involved in institutions suspected of corrupt practices and in other words the witness's information is key for disclosure of a case of corruption. The problem in this study is whether the similarities and differences between justice collaborator and whistleblowers in corruption, and how is the legal protection between justice collaborator and whistleblower in criminal acts of corruption. This research uses normative juridical and juridical empirical research methods with qualitative data analysis. The data sources used in this study are primary, secondary, and tertiary legal materials. The results showed that whistleblower equations and justice collaborator were in 3 (three) categories, namely vision and mission in uncovering criminal acts of corruption, guarantee of protection in the form of physical, psychological and legal protection, and awards where whistleblowers and justice collaborators cannot be prosecuted criminal and civil and given sentence relief. In addition to these equations, there are also differences between whistleblowers and justice collaborator divided into 4 (four) categories, namely subject, motivation, guarantee of protection, and procedural law. The protection between justice collaborator and whistleblower in corruption namely legal protection in the form of keeping the identity of the witness confidential and then provides security for witnesses in the trial process by providing physical, psychological, and legal protection.


Author(s):  
Charlotte P. Lee ◽  
Kjeld Schmidt

The study of computing infrastructures has grown significantly due to the rapid proliferation and ubiquity of large-scale IT-based installations. At the same time, recognition has also grown of the usefulness of such studies as a means for understanding computing infrastructures as material complements of practical action. Subsequently the concept of “infrastructure” (or “information infrastructures,” “cyberinfrastructures,” and “infrastructuring”) has gained increasing importance in the area of Computer-Supported Cooperative Work (CSCW) as well as in neighboring areas such as Information Systems research (IS) and Science and Technology Studies (STS). However, as such studies have unfolded, the very concept of “infrastructure” is being applied in different discourses, for different purposes, in myriad different senses. Consequently, the concept of “infrastructure” has become increasingly muddled and needs clarification. The chapter presents a critical investigation of the vicissitudes of the concept of “infrastructure” over the last 35 years.


Sign in / Sign up

Export Citation Format

Share Document