Netzwerk Phänomenologische Metaphysik
203089

Palgrave Macmillan, Basingstoke

2016

234 Pages

ISBN 978-3-319-29268-7

Enacting research methods in information systems 2

Edited by

Leslie P Willcocks , Chris Sauer, Mary C. Lacity

This edited three volume edition brings together significant papers previously published in the Journal of information Technology (JIT) over its 30 year publication history. The three volumes of Enacting Research Methods in Information Systems celebrate the methodological pluralism used to advance our understanding of information technology's role in the world today. In addition to quantitative methods from the positivist tradition, JIT also values methodological articles from critical research perspectives, interpretive traditions, historical perspectives, grounded theory, and action research and design science approaches.

Volume1 covers Critical Research, Grounded Theory, and Historical Approaches. Volume 2 deals with Interpretive Approaches and also explores Action Research. Volume 3 focuses on Design Science Approaches and discusses Alternative Approaches including Semiotics Research, Complexity Theory and Gender in IS Research.

The Journal of Information Technology (JIT) was started in 1986 by Professors Frank Land and Igor Aleksander with the aim of bringing technology and management together and bridging the "great divide" between the two disciplines. The Journal was created with the vision of making the impact of complex interactions and developments in technology more accessible to a wider audience. Retaining this initial focus, the JIT has gone on to extend into new and innovative areas of research such as the launch of JITTC in 2010. A high impact journal, JIT shall continue to publish leading trends based on significant research in the field.

Publication details

Full citation:

Willcocks, L. , Sauer, C. , Lacity, M.C. (eds) (2016). Enacting research methods in information systems 2, Palgrave Macmillan, Basingstoke.

Table of Contents

Introduction

Willcocks Leslie; Sauer Chris; Lacity Mary C

1-8

Open Access Link
An exploration of information systems adoption

Bunker Deborah; Kautz Karlheinz; Anhtuan Anhtai

116-133

Open Access Link
Institutionalizing operational risk management

Hsu Carol; Backhouse James; Silva Leiser

134-166

Open Access Link
The rise of the Phoenix

Wastell David G.

191-212

Open Access Link

This document is unfortunately not available for download at the moment.