Search results

1 – 10 of over 6000
Open Access
Article
Publication date: 30 April 2021

Lakshmi Balachandran Nair

Many management scholars view templates as rigid rulebooks suffocating qualitative research. This viewpoint article recommends that, instead, templates should be viewed through…

2294

Abstract

Purpose

Many management scholars view templates as rigid rulebooks suffocating qualitative research. This viewpoint article recommends that, instead, templates should be viewed through the lens of organizational routines.

Design/methodology/approach

To facilitate this viewpoint, this article first clarifies the confusions surrounding templates. It points out that how using templates, like following routines in an organization, constitutes three parts - the artifact, the ostensive and the performative; the latter two being often neglected by template critics. The use of templates is encouraged by discussing the learning advantages for novice researchers, through an autoethnographic note narrating the author’s own research and teaching experiences.

Findings

This article deliberates upon the criticisms against templates. It then discusses templates using a perspective offered by organizational routines. Thereafter, the use of templates in qualitative management research is discussed, with the help of examples from published reports. Finally, the article explains a way of reflexively using templates through an autoethnographic note detailing the author’s own research and teaching experiences.

Originality/value

In its entirety, the article submits that the artifacts offered by the templates and the ostensive and performative engagements of the template-users must co-exist for co-creating excellent qualitative research.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 16 no. 2
Type: Research Article
ISSN: 1746-5648

Keywords

Open Access
Article
Publication date: 7 March 2023

Oko Chima Enworo

This paper illustrates how Guba and Lincoln's parallel criteria for establishing trustworthiness, can be adapted and applied to qualitative research on indigenous social…

11425

Abstract

Purpose

This paper illustrates how Guba and Lincoln's parallel criteria for establishing trustworthiness, can be adapted and applied to qualitative research on indigenous social protection systems. It provides insights for social protection researchers, exploring plausible qualitative research rigor evaluation criteria, on plausible alternatives.

Design/methodology/approach

The paper draws on qualitative evidence from a larger ethnographic study on the dynamics of indigenous social protection systems in Nigeria. It illustrates the systematic application of Guba and Lincoln's parallel criteria.

Findings

Available evidence from the study shows that Guba and Lincoln's parallel criteria is viable for establishing trustworthiness of qualitative research on indigenous social protection systems. The criteria can facilitate credible and reliable research outcomes in research on improving social protection policy and practice.

Research limitations/implications

Qualitative inquiries that draw on Guba and Lincoln's parallel criteria as evaluation criteria for trustworthiness can complement quantitative research on social protection. This makes it imperative to incorporate both, in social protection research for a holistic system. How this can be done is beyond the scope of this paper but needs to be explored by future research.

Originality/value

Contrary to the use of Guba and Lincoln's parallel criteria in qualitative research in other contexts, the use of the criteria has not been carefully examined in qualitative research on indigenous social protection systems. This paper is an attempt to fill this gap.

Details

Qualitative Research Journal, vol. 23 no. 4
Type: Research Article
ISSN: 1443-9883

Keywords

Open Access
Article
Publication date: 21 November 2017

Marco Bevolo

The purpose of this paper is to report the grounded theory empirical validation on key categories within a design-led methodology to envision urban futures. The paper focuses on…

1391

Abstract

Purpose

The purpose of this paper is to report the grounded theory empirical validation on key categories within a design-led methodology to envision urban futures. The paper focuses on the editorial products and the design concepts that constitute the heart of the approach. An original elaboration of trend clusters is presented as an exemplification of the outcome of this trend research approach. Although the approach was not created from the viewpoint of tourism and leisure, bibliographic notes on place-making complement it for this journal.

Design/methodology/approach

The paper presents empirical findings extracted by the means of the grounded theory, with the purpose to empirically validate two key categories (product and process) of a urban futures methodology. The methodology is an application of High Design, the process in use at Royal Philips BV for two decades. This methodology is contextualized within the constructivist episteme, as defined by the editors of this journal in a separate publication. Bibliographic references to place-making complete the paper.

Findings

The following findings are provided: empirical validation of the city.people.light communication platform (qualitative research); empirical validation of the city.people.light workshop practice (qualitative research); and bibliographic descriptions of the design process governing city.people.light and newly developed urban futures trend clusters, at European level, as an exemplification of the program/approach outcome.

Research limitations/implications

The paper is structured according to a multi-layered editorial focus. Empirical findings were generated at primary research level in a 2013-2015 grounded theory projected by the author. Furthermore, the author directed the research processes and products that are the object of empirical validation. Newly defined elaborations and a discussion thereof is offered, taking into account contemporary place-making issues.

Practical implications

The original design-based methodology is a structured practice in urban futures from applied sciences and corporate innovation viewpoint. In this paper, its key categories are empirically validated through the grounded theory. Additionally, outcome from the original foresight programs is presented and a bibliographic review is provided from the viewpoint of place-making.

Social implications

The co-creative methodology herein empirically validated is socio-cultural centered, with a strong drive to coutnerbalance the positivist and engineering corporate mindset through a humanistic concern for people. The framework in terms of place-making takes into account postmodern evolutions of the field.

Originality/value

The paper benefits from a unique mix of: epistemic note on tourism, leisure, and the future; original urban futures scenarios and design concepts from a world class corporate innovation program; and the actual empirical core of the grounded theory validation as performed in a dedicated research project. These three separate streams are mutually related.

Details

Journal of Tourism Futures, vol. 3 no. 2
Type: Research Article
ISSN: 2055-5911

Keywords

Open Access

Abstract

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 13 no. 3
Type: Research Article
ISSN: 1746-5648

Open Access
Article
Publication date: 11 August 2023

Michael Nii Laryeafio and Omoruyi Courage Ogbewe

Qualitative research that involves the use of human participants calls for the need to protect those participants to give their honest view during data collection. This is an…

10062

Abstract

Purpose

Qualitative research that involves the use of human participants calls for the need to protect those participants to give their honest view during data collection. This is an important part of every primary data collection in qualitative studies using interviews. This paper aims to investigate all available ethical considerations that need to be observed by the researcher when conducting primary data collection through interview and to explore the theories that underpin the ethics in qualitative studies.

Design/methodology/approach

This paper systemically reviewed existing qualitative data on ethics and gathered information that were analysed and presented on the topic area.

Findings

The findings show that ethical considerations deal with the various approaches adopted by the researcher to make the participants feel safe to participate in any given researcher. During an interview process in qualitative research, the findings show that anonymity, voluntary participation, privacy, confidentiality, option to opt out and avoiding misuse of findings are ethical considerations that must be observed by the researcher. The outcome of the investigation also shows that deontology and utilitarianism, rights and virtue are the main theories that underpin ethical considerations in research.

Originality/value

The rights of the research participants need to be respected in qualitative research to assist in gathering accurate information to achieve the objectives of study. This and other ethical principles such as anonymity, privacy, confidentiality, voluntary participation and option to opt out guide the researcher to systematically adhere to data collection approaches that yield valid results in qualitative data collection using interviews.

Details

Journal of Ethics in Entrepreneurship and Technology, vol. 3 no. 2
Type: Research Article
ISSN: 2633-7436

Keywords

Open Access
Article
Publication date: 30 September 2019

Leandro da Silva Nascimento and Fernanda Kalil Steinbruch

In qualitative research, it is recurrent to conduct data collection through interviews, which must be first transcribed for the data to be analyzed. Although there is a…

16359

Abstract

Purpose

In qualitative research, it is recurrent to conduct data collection through interviews, which must be first transcribed for the data to be analyzed. Although there is a relationship between the stages of the interview and the data analysis, the link between them (i.e. the transcription) seems to be a neglected methodological procedure. This occurs because, in papers, it is generally reported that “the interviews were transcribed”, without any details about the transcriptions conduction. From this methodological gap, this paper aims to discuss the relevance of detailing the methodological procedures adopted in the transcription in research reports in the management field.

Design/methodology/approach

This paper takes the form of a methodological essay.

Findings

The discussion focuses on the concepts of naturalized and denaturalized transcription, the relevance of adopting transcription norms and the need for reflexivity in conducting transcriptions – elements that must be explained in research reports to improve the methodological quality.

Practical implications

This paper explores methodological details that management students and researchers can adopt when performing transcriptions. Consequently, journal editors and reviewers will have more subsidies on the methodological quality employed in researches, which contributes to a better evaluation process.

Originality/value

This study demonstrates the relevance of a neglected methodological technique – transcription, which needs to be detailed in research reports, to contribute to the increase of methodological accuracy and to provide essential information to readers, allowing them to evaluate the rigor of the research. Thus, it is proposed that transcription should be considered a quality criterion in qualitative research.

Details

RAUSP Management Journal, vol. 54 no. 4
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 30 December 2022

Durga Prasad Dube and Rajendra Prasad Mohanty

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…

1527

Abstract

Purpose

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.

Design/methodology/approach

There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.

Findings

For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.

Research limitations/implications

The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.

Practical implications

The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.

Social implications

Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.

Originality/value

During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Book part
Publication date: 9 December 2021

Alex Stedmon and Daniel Paul

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson

Abstract

In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.

This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.

Open Access
Article
Publication date: 5 December 2023

Bargavi Ravichandran and Kavitha Shanmugam

This conceptual study investigates the adoption of education technology (EdTech) products among college students, focusing on identifying the key factors influencing the adoption…

Abstract

Purpose

This conceptual study investigates the adoption of education technology (EdTech) products among college students, focusing on identifying the key factors influencing the adoption process within educational institutions. Technology integration in education has rapidly gained prominence, with EdTech offering innovative solutions to enhance teaching and learning experiences. However, understanding the determinants that affect EdTech adoption remains critical for its successful implementation and impact. This paper aims (1) to identify the factors influencing the adoption of EdTech by college students (2) to create a conceptual model that shows the connections between the elements that lead to college students adopting EdTech.

Design/methodology/approach

The research employed a mixed-methods approach, combining qualitative data analysis and conceptual modeling to achieve the objectives. The underlying knowledge required to create a qualitative data gathering tool was obtained through a thorough literature analysis on innovation dissemination, educational psychology and technology adoption. College students, teachers and administrators participated in semi-structured interviews, focus groups and surveys to provide detailed perspectives on their attitudes about and experiences with EdTech. The Scopus and Web of Science databases are searched for relevant information in an organized manner in order to determine the factors influencing the adoption of EdTech. Second, an extended version of the technology adoption model is adopted to develop a qualitative data-based conceptual framework to analyze EdTech adoption in the Indian context.

Findings

Overall, by highlighting the critical components that emotionally influence college students' adoption of EdTech products in educational institutions, this course adds to the body of information already in existence. The conceptual framework model serves as a roadmap for educational stakeholders seeking to leverage EdTech effectively to enrich the learning environment and improve educational outcomes. By recognizing the significance of the identified factors, academic institutions can make informed decisions to foster a climate conducive to successful EdTech integration.

Research limitations/implications

A comprehensive conceptual framework model was developed based on qualitative data analysis to illustrate the interrelationships between the identified factors influencing EdTech adoption. This model presents a valuable tool for educational institutions, policymakers and EdTech developers to comprehend the complex dynamics of implementing these technological solutions.

Originality/value

The findings of this study demonstrated a number of important variables that affect the uptake of EdTech products in educational settings. These factors encompassed technological infrastructure, ease of use, perceived usefulness, compatibility with existing academic practices, institutional support, financial constraints and individual attitudes towards technology. Additionally, the research explored the significance of institutional preparation for embracing technological advancements as well as the influence of socio-cultural elements.

Details

Management Matters, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2279-0187

Keywords

Open Access
Article
Publication date: 12 March 2024

Edicleia Oliveira, Serge Basini and Thomas M. Cooney

This article aims to explore the potential of feminist phenomenology as a conceptual framework for advancing women’s entrepreneurship research and the suitability of…

Abstract

Purpose

This article aims to explore the potential of feminist phenomenology as a conceptual framework for advancing women’s entrepreneurship research and the suitability of interpretative phenomenological analysis (IPA) to the proposed framework.

Design/methodology/approach

The article critically examines the current state of women’s entrepreneurship research regarding the institutional context and highlights the benefits of a shift towards feminist phenomenology.

Findings

The prevailing disembodied and gender-neutral portrayal of entrepreneurship has resulted in an equivocal understanding of women’s entrepreneurship and perpetuated a male-biased discourse within research and practice. By adopting a feminist phenomenological approach, this article argues for the importance of considering the ontological dimensions of lived experiences of situatedness, intersubjectivity, intentionality and temporality in analysing women entrepreneurs’ agency within gendered institutional contexts. It also demonstrates that feminist phenomenology could broaden the current scope of IPA regarding the embodied dimension of language.

Research limitations/implications

The adoption of feminist phenomenology and IPA presents new avenues for research that go beyond the traditional cognitive approach in entrepreneurship, contributing to theory and practice. The proposed conceptual framework also has some limitations that provide opportunities for future research, such as a phenomenological intersectional approach and arts-based methods.

Originality/value

The article contributes to a new research agenda in women’s entrepreneurship research by offering a feminist phenomenological framework that focuses on the embodied dimension of entrepreneurship through the integration of IPA and conceptual metaphor theory (CMT).

Details

International Journal of Entrepreneurial Behavior & Research, vol. 30 no. 11
Type: Research Article
ISSN: 1355-2554

Keywords

1 – 10 of over 6000