1 / 8

The Exemplary Study

The Exemplary Study. A Thematic Approach Team Cybersecurity. The Overview. Method Literature Review Findings Contribution Why We Liked Our Choice A Good Model. The Method. Guidelines: Qualitative Analysis Thematic Approach to Discussion A Variety of Journals IT/IS Based Studies

lenka
Download Presentation

The Exemplary Study

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Exemplary Study A Thematic Approach Team Cybersecurity

  2. The Overview • Method • Literature Review • Findings • Contribution • Why We Liked Our Choice • A Good Model

  3. The Method • Guidelines: • Qualitative Analysis • Thematic Approach to Discussion • A Variety of Journals • IT/IS Based Studies • Searched peer-reviewed articles • Decided to search on SuprateekSarker only • Successful author • Numerous journals • Qualitative Expert

  4. The Review • Not focused on specific content other than an IT study • Used SuprateekSarker as our reference point due to his renown in qualitative analysis • Titles included: • Crises in Business Markets • Assessing the Relative Contribution of the Facets of Agility • Exploring Agility in Distributed Information Systems Development Teams • Determinants of Effective Leadership in Information Systems Development Teams: F2F vs Virtual • Emerging On-Line “Third Place” for IS Students

  5. The Findings • Journals represented a broad cross-section of types/quality • Journal of the Academy of Marketing Science • Journal of Information Technology Theory and Application • Journal of Information Systems Education • EJIS • ISR • Theme-based reporting in all the articles

  6. Findings Con’t • Thematic approach relies more on “Grounded Theory” approach in some ways • Data from research truly leads to exploration and explanation of key emergent themes • Selected article from ISR as an exemplar

  7. Article Chosen • “Exploring Agility in Distributed ISD Teams: An Interpretive Study in an Offshoring Context” • From ISR, 2009 • Suprateek and SaoneeSarker • Structure: • Intro • Brief Review of Agility • Research Methodology (Two years of multi-method qualitative study) • “Categories of Agility” Analysis/Reporting • Interrelationship Analysis • Discussion with Contributions and Conclusion

  8. Why? • Well written • Parallels to our study • Insider Threat has a number of categories • These categories have a number of strategies associated with them • We see some interrelationships among the categories • Time frame and context are slightly different, but overall, the methods of collection and the “case study” nature make it a good fit • Published in a top journal, ergo, a good model to follow

More Related