Search results

1 – 10 of over 23000
Book part
Publication date: 1 August 2004

Don D Bergh, Ralph Hanke, Prasad Balkundi, Michael Brown and Xianghong Chen

The authors content analyze 76 empirical Strategic Management Journal articles to determine how studies control for threats to internal validity, a common source of flaws in…

Abstract

The authors content analyze 76 empirical Strategic Management Journal articles to determine how studies control for threats to internal validity, a common source of flaws in research designs. Results indicate that most studies fail to control for one or more threats to internal validity. In particular, selection effects were the most frequently appearing threat, followed by history effects, ambiguity about the direction of causal inference, changing data sources and subject mortality. In general, the results suggest that strategy researchers need to more carefully account for threats to the internal validity of their research designs. Suggestions for addressing these problems are provided.

Details

Research Methodology in Strategy and Management
Type: Book
ISBN: 978-1-84950-235-1

Article
Publication date: 12 April 2011

Eeva‐Mari Ihantola and Lili‐Anne Kihn

The purpose of this paper is to shed light on the threats to quality in mixed methods accounting research, wherein quantitative and qualitative approaches are combined in data…

9227

Abstract

Purpose

The purpose of this paper is to shed light on the threats to quality in mixed methods accounting research, wherein quantitative and qualitative approaches are combined in data collection, analysis and interpretation.

Design/methodology/approach

The paper is framed according to three perspectives. The authors first synthesize the threats to validity and reliability in quantitative and qualitative parts of mixed methods research using the quality standards of each; they then introduce an integrative framework of mixed methods research quality by Teddlie and Tashakkori. Thereafter, they address the specific threats to quality that come to the fore when inferences from the quantitative and qualitative components of the study are combined to form meta‐inferences using a legitimation framework by Onwuegbuzie and Johnson.

Findings

The authors' analysis not only indicates a wide range of threats to the validity and reliability of mixed methods research in a range of categories, but also clarifies how the three perspectives described in this paper are linked and supplement each other.

Research limitations/implications

Methodological research published in English over the last decade is emphasized to create an approach to assess mixed methods accounting research. The frameworks analyzed could still be studied in greater detail. Additional perspectives on the validity and reliability of mixed methods research could also be studied and developed.

Practical implications

This paper furthers our understanding of such new developments in methodological research, which may be of great importance to those conducting or evaluating empirical research.

Originality/value

Based on a comprehensive synthesis, this paper presents and analyzes theoretical frameworks potentially useful for scholars, students and practitioners. It focuses on both traditional and novel areas of validity and reliability in mixed methods research.

Details

Qualitative Research in Accounting & Management, vol. 8 no. 1
Type: Research Article
ISSN: 1176-6093

Keywords

Article
Publication date: 1 January 1999

Errol R. Iselin

The “Mathews Committee” (Mathews, 1990) concluded that the research performance of the accounting discipline in Australia was weak. This paper is motivated by the need to improve…

Abstract

The “Mathews Committee” (Mathews, 1990) concluded that the research performance of the accounting discipline in Australia was weak. This paper is motivated by the need to improve the quality of accounting research in Australia and probably some other countries as well. It discusses three issues of crucial importance to research quality ‐ internal, external, and construct validity with the discussion illustrated with examples from existing accounting research. Internal validity is concerned with the ability to make causal statements from a piece of research. External validity is concerned with the ability to generalize from the research and construct validity is interested in the validity of the variables measured. Internal and external validity are discussed within the context of five common research designs. No one design is strong in both types of validity and tradeoffs between internal and external validity are necessary. When designing a new research project, the particular tradeoffs made should depend on the research objectives. The paper discusses how these choices might be made and how, if internal validity problems exist, they might be minimized. With construct validity, no tradeoffs are appropriate ‐ the researcher should attempt to eliminate this type of invalidity. The paper discusses how this might be done.

Details

Asian Review of Accounting, vol. 7 no. 1
Type: Research Article
ISSN: 1321-7348

Article
Publication date: 25 April 2023

Jie Huang, Chunyong Tang and Yali Li

This research aims to present the results of a study that operationalizes the construct of perceived work identity deprivation (PWID) and examines its validity.

Abstract

Purpose

This research aims to present the results of a study that operationalizes the construct of perceived work identity deprivation (PWID) and examines its validity.

Design/methodology/approach

The authors adopted a mixed method design in this study where a Likert-type scale to measure PWID was developed based on the interviews of 40 workers and the questionnaires of 625 participants successively. Later, the generalizability of the scale was tested through quantitative data from 412 workers. Finally, validity analysis was conducted based on 380 usable questionnaires. Data were analyzed using IBM SPSS 24 and Mplus 7.0.

Findings

The findings of the study indicate that the reliability measures, exploratory factor analyses, confirmatory factor analysis and subsequent convergent and discriminant validity tests support the PWID scale. The nomological validity of PWID is also presented, which demonstrates its predictive validity.

Originality/value

Despite highlighting the importance of work identity, prior research lacked to provide empirical foundations to understand this perception. This study fills this gap in the literature by providing a measure of PWID, distinguishing it from similar constructs and establishing convergent, discriminant and nomological validity. Moreover, by extending the range of theoretical and measurable deprivation of work identity, the authors hope to allow research to take into account a more complete picture of it. PWID scale can be used to develop more relevant suppression plans.

Details

Chinese Management Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-614X

Keywords

Abstract

Details

The Emerald Review of Industrial and Organizational Psychology
Type: Book
ISBN: 978-1-78743-786-9

Book part
Publication date: 1 August 2004

Stanley F Slater and Kwaku Atuahene-Gima

This paper considers threats to the internal validity of field studies that utilize survey data. Compared to laboratory experiments and field experiments, field surveys should be…

Abstract

This paper considers threats to the internal validity of field studies that utilize survey data. Compared to laboratory experiments and field experiments, field surveys should be strong in realism, practical significance, and normative quality. However, there are substantial threats to internal validity that fall into the general categories of sampling and measurement. We consider these issues and how to deal with them. We pay special attention to the existence and impact of common method variance including strategies for avoiding it, methods for assessing it, and approaches to correcting for it. Our objective is to provide a road map for better use of survey methods.

Details

Research Methodology in Strategy and Management
Type: Book
ISBN: 978-1-84950-235-1

Book part
Publication date: 5 December 2017

Robin Martin, Olga Epitropaki and Laurie O’Broin

Leadership training has led to a large amount of research due to the belief that such training can lead to (or more precisely cause) positive changes in followers’ behavior and…

Abstract

Leadership training has led to a large amount of research due to the belief that such training can lead to (or more precisely cause) positive changes in followers’ behavior and work performance. This chapter describes some of the conditions necessary for research to show a causal relationship between leadership training and outcomes. It then describes different research designs, employed in leadership training research, and considers the types of problems that can affect inferences about causality. The chapter focuses on the role of randomization of leaders (e.g., into training vs. non-training conditions) as a key methodological procedure and alludes to problems of achieving this in field settings.

Details

Methodological Challenges and Advances in Managerial and Organizational Cognition
Type: Book
ISBN: 978-1-78743-677-0

Keywords

Article
Publication date: 12 February 2021

Anastasiia Popelnukha, Shamika Almeida, Asfia Obaid, Naukhez Sarwar, Cynthia Atamba, Hussain Tariq and Qingxiong (Derek) Weng

Although voice endorsement is essential for individuals, teams and organizational performance, leaders who consider followers' voice to be threatening are reluctant to implement…

1221

Abstract

Purpose

Although voice endorsement is essential for individuals, teams and organizational performance, leaders who consider followers' voice to be threatening are reluctant to implement followers' ideas. The authors, taking note of this phenomenon, investigate why leaders who feel a threat from followers' voice exhibit voice rejection at the workplace and when this detrimental tendency can be diminished. Thus, based on the self-defense tendency as per self-affirmation theory, the authors argue that those leaders who experience threat triggered by followers' voice, justify voice rejection through the self-defense tactics: message derogation and source derogation. In addition, the authors also propose that a leader's positive (negative) affect experienced before voice exposure may decrease (increase) self-defense and voice rejection.

Design/methodology/approach

To test the authors’ moderated mediation model, they conducted two independent vignette studies (N = 269; N = 208). The purpose of the first vignette study was to test the simple mediation (i.e. the direct and indirect effects), whereas the second study aimed to test the moderated mediation model.

Findings

In Study 1, the authors found that the leader's perceived threat to competence provoked by followers' voice was positively related to voice rejection, and the relationship was partially mediated by message derogation and source derogation. In line with this, in Study 2, the authors tested the moderated mediation model and replicated the findings of Study 1. They found that the effects of leader's perceived threat to competence on voice rejection through self-defense tactics are weaker (stronger) at the high (low) values of a leader's positive affect. In contrast, the effects of a leader's perceived threat to competence on voice rejection through self-defense tactics are stronger (weaker) at the high (low) values of a leader's negative affect.

Originality/value

This study suggests that leaders who experience a threat to competence instigated by employee voice are more likely to think that ideas proposed by employees are non-constructive and employees who suggest those ideas are not credible, and these appraisals have a direct influence on voice rejection. However, if leaders are in a good mood vs. bad mood, they will be less likely to think negatively about employees and their ideas even when they experience psychological threats. The findings highlight several avenues for future researchers to extend the literature on employee voice management and leadership coaching by providing theoretical and managerial implications.

Details

Personnel Review, vol. 51 no. 1
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 30 November 2004

Athanasis Karoulis, Panagiotis Sfetsos, Ioannis Stamelos, Lefteris Angelis and Andreas Pombortsis

This study is concerned with the formal assessment of a Distance Learning Environment (DLE) created to deliver a course on UML sequence diagrams to university‐level students…

Abstract

This study is concerned with the formal assessment of a Distance Learning Environment (DLE) created to deliver a course on UML sequence diagrams to university‐level students, divided into control and treatment groups. An ad‐hoc DLE was constructed to deliver instruction to the treatment group, while the control group was taught in a traditional face‐to‐face way. The main point of concern is whether a DLE can be as effective for the treatment group, as the faceto‐ face lecture is for the control group, in terms of gaining mastery on the domain. So, a controlled experiment was organized and executed, in order to measure the participants’ performance in both groups. The results have shown no statistically significant difference for both groups of students. So, it can be argued that in the context of this experiment and by following a DLE‐design close enough to the traditional face‐to‐face approach, one can obtain equally good results using distance learning as with the traditional system. However, a number of concerns remain and more work is needed to generalize the results of this work on other domains.

Details

Interactive Technology and Smart Education, vol. 1 no. 4
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 12 June 2023

Pintu Shah and Anuja Agarwal

The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the…

Abstract

Purpose

The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a promising approach for implementing security education, training and awareness program. In this paper, the researchers propose a tabletop card game called Cyber Suraksha to increase threat awareness and motivate users to adopt recommended security controls for smartphone users. Cyber Suraksha provides an active learning environment for the players. This paper aims to provide the details of the design and evaluation of the game using a between-subjects design.

Design/methodology/approach

The researchers have used constructive learning theory and the Fogg behaviour model (FBM) to design a tabletop card game called Cyber Suraksha. The researchers evaluated the game using a between-subjects design. The participants' responses in the control and intervention groups were collected using the risk behaviour diagnosis scale. Pearson’s Chi-Square test with a 5% significance level was used to test the hypotheses.

Findings

The results indicate that the game is enjoyable and fun. Cyber Suraksha game effectively motivates users to adopt the recommended security control for the targeted behaviour. The results indicate that the participants in the intervention group are 2.65 times more likely to adopt recommended behaviour. The findings of this study provide evidence for the effectiveness of hope and fear appeals in improving cybersecurity awareness.

Research limitations/implications

The generalizability of the study is limited because the sample size is small compared to the total number of smartphone users in India, and only students from computer/IT UG programs in India are used as participants in this study.

Practical implications

This study uses hope and a fear appeal to design an effective serious game. It also demonstrates using the FBM and constructive learning principles for effective serious game design. Cyber Suraksha is effective for the student group and may be tested with other age groups.

Originality/value

To the researchers' knowledge, there are no serious games for cybersecurity awareness focusing on the threats faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to motivate smartphone users to adopt recommended security controls.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 23000