A Primer on Q-Method and the Study of Technology

Author(s):  
Stéphanie Gauttier

Qualitative methods are under-represented in the articles published by the main journals in Information Systems, which seem to privilege quantitative studies and statistical representativity of results, following the R logic. This chapter provides an in-depth description of Q-method and demonstrates how its use could be beneficial to studies of technology and could reinforce the transparency and validity of other qualitative methods. The focus of this chapter lies in explaining how Q-method works, so that readers are equipped to set up their own Q-studies. It is based on prior literature and ongoing reflections being held by Q-methodologists online.

2022 ◽  
pp. 498-509
Author(s):  
Stéphanie Gauttier

Qualitative methods are under-represented in the articles published by the main journals in Information Systems, which seem to privilege quantitative studies and statistical representativity of results, following the R logic. This chapter provides an in-depth description of Q-method and demonstrates how its use could be beneficial to studies of technology and could reinforce the transparency and validity of other qualitative methods. The focus of this chapter lies in explaining how Q-method works, so that readers are equipped to set up their own Q-studies. It is based on prior literature and ongoing reflections being held by Q-methodologists online.


2014 ◽  
Vol 701-702 ◽  
pp. 919-922
Author(s):  
Hong Fei Xu ◽  
Si Rui Pang ◽  
Jian Wen Du ◽  
Xue Mei Li

A system includes three power information security defense line is constructed, to achieve the information network, information outside the network, scheduling data network depth protection. According to the information security protection requirements, starting from the overall structure of information systems, taking into account the information system to schedule production system as the core, based on independent research and development of core information security isolation unit, set up three lines of defense in the power of information systems, electricity secondary system, information network systems, information systems outside the network partition protection.


2014 ◽  
Vol 926-930 ◽  
pp. 2706-2709
Author(s):  
Ming Wen Hu

With the rapid development of social productive forces and increasingly higher level of social life, the sports humanity as the core spirit of sports culture in informational times, which is the sum of the psychological aspects of sports culture from the cultural spirit. Its essence is the pursuit of truth, good and beautiful as the core values and ideals, people's healthy development as the ultimate goal. This paper discusses basic mode ,the basic framework of the multimedia sports humanistic information system, the processing technology, development environment ,tools and methods . Through the analysis program implementation elements and design ideas of multimedia sports humanistic information system, in order to set up multimedia sports humanistic information systems, we proposes a viable framework and models with a theoretical basis and practical value.


2021 ◽  
pp. 153568412110547
Author(s):  
Zawadi Rucks-Ahidiana

Academics largely define gentrification based on changes in the class demographics of neighborhood residents from predominately low-income to middle-class. This ignores that gentrification always occurs in spaces defined by both class and race. In this article, I use the lens of racial capitalism to theorize gentrification as a racialized, profit-accumulating process, integrating the perspective that spaces are always racialized to class-centered theories. Using the prior literature on gentrification in the United States, I demonstrate how the concepts of value, valuation, and devaluation from racial capitalism explain where and how gentrification unfolds. Exposure to gentrification varies depending on a neighborhood’s racial composition and the gentrification stakeholders involved, which contributes to racial differences in the scale and pace of change and the implications of those changes for the processes of displacement. Revising our understanding of gentrification to address the racialization of space helps resolve seemingly contradictory findings across qualitative and quantitative studies.


Author(s):  
Nava Pliskin ◽  
Marta Zarotski

Dead Sea Works is an international multi-firm producer of Potash and other chemicals whose sales for 1998 were about $500 million. In 1996, the Information Systems group convinced top management to pursue a big-bang ERP implementation of SAP R/3. To reduce project risk, risk management was practiced. First, only modules that matched the functionality of the then-existing systems were targeted, avoiding as much as possible software modifications and process reengineering. Second, a steering committee was set up to handle conflict resolution and set priorities throughout the project and top users were given responsibility with implementing modules within the irrespective functions. R/3 went into production on July 1, 1998, six months ahead of schedule and without exceeding the $4.95 million budget.


Author(s):  
Felix R. Doldán Tie ◽  
Paula Luna Huertas ◽  
Francisco Jose Martínez Lopez ◽  
Carlos Piñeiro Sanchez

The practice of information systems/information technology (IS/IT) outsourcing is a major issue which has received much attention, as shown by the extensive literature on the topic. However, most works on outsourcing have focused on theoretical topics, and there are but a few empirical, quantitative studies. This chapter presents an empirical study of IS/IT outsourcing in Spain, which has been conducted along the lines of prior research carried out in different countries, and which focuses on the types, functions and targets of outsourcing contracts. We also attempt to examine the influence that this practice may have on the organizations’ management structure. A survey carried out on 530 Spanish firms has shown that 50% of Spanish large firms have outsourced part of their IS/IT, whereas outsourcing is practiced by 20% of medium-sized enterprises. Finally, it has been observed that the most frequently outsourced activities in Spain are hosting and Internet-related services.


2003 ◽  
pp. 133-143
Author(s):  
Georg Disterer

Many elderly people (age of 60+) are keen on getting familiar with the Internet. At the same time, end-user training gets more and more important for IT management. Therefore, we implemented a graduate Information Systems course, where students have to design, organize, manage, and run a training session, where elderly people can see and try using the Internet. The students learned to design a teaching curriculum and teaching materials, to set up and maintain the technical infrastructure, to organize end-user training, and, most importantly, to teach and to train end-users.


2011 ◽  
pp. 271-288 ◽  
Author(s):  
Eileen M. Trauth

This book is about the use of qualitative methods in the conduct of information systems research. As the title suggests, it is concerned both with trends in the choice of qualitative methods and with issues with the use of these methods. The issues have been addressed on two levels. The section on individual issues considers specific issues encountered by individual researchers in the conduct of particular research projects. The section on issues for the profession considers issues that the IS profession is currently confronting and those it will have to address in the future.


Author(s):  
Purnendu Mandal

A.B.C. Engineering is a Melbourne-based job shop manufacturing company. The company attempted a major improvement in the information technology area by implementing and enhancing the capability of a MIS software package called ManuSoft. The General Manager of A.B.C Engineering felt that the implementation of this commercially available package would enhance the productivity and help managers in the planning process. The company carried out a detailed study on various IT tools and information systems softwares that are applicable to the job shop manufacturing situation. Considering the prevailing company situations, it was decided that ManuSoft would satisfy the information requirements. A project team was set up to study the scope of IT improvements and implement the required IT/IS system.


2013 ◽  
Author(s):  
Simon Bell ◽  
Trevor Wood-Harper
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document