80 likes | 224 Views
The Exemplary Study. A Thematic Approach Team Cybersecurity. The Overview. Method Literature Review Findings Contribution Why We Liked Our Choice A Good Model. The Method. Guidelines: Qualitative Analysis Thematic Approach to Discussion A Variety of Journals IT/IS Based Studies
E N D
The Exemplary Study A Thematic Approach Team Cybersecurity
The Overview • Method • Literature Review • Findings • Contribution • Why We Liked Our Choice • A Good Model
The Method • Guidelines: • Qualitative Analysis • Thematic Approach to Discussion • A Variety of Journals • IT/IS Based Studies • Searched peer-reviewed articles • Decided to search on SuprateekSarker only • Successful author • Numerous journals • Qualitative Expert
The Review • Not focused on specific content other than an IT study • Used SuprateekSarker as our reference point due to his renown in qualitative analysis • Titles included: • Crises in Business Markets • Assessing the Relative Contribution of the Facets of Agility • Exploring Agility in Distributed Information Systems Development Teams • Determinants of Effective Leadership in Information Systems Development Teams: F2F vs Virtual • Emerging On-Line “Third Place” for IS Students
The Findings • Journals represented a broad cross-section of types/quality • Journal of the Academy of Marketing Science • Journal of Information Technology Theory and Application • Journal of Information Systems Education • EJIS • ISR • Theme-based reporting in all the articles
Findings Con’t • Thematic approach relies more on “Grounded Theory” approach in some ways • Data from research truly leads to exploration and explanation of key emergent themes • Selected article from ISR as an exemplar
Article Chosen • “Exploring Agility in Distributed ISD Teams: An Interpretive Study in an Offshoring Context” • From ISR, 2009 • Suprateek and SaoneeSarker • Structure: • Intro • Brief Review of Agility • Research Methodology (Two years of multi-method qualitative study) • “Categories of Agility” Analysis/Reporting • Interrelationship Analysis • Discussion with Contributions and Conclusion
Why? • Well written • Parallels to our study • Insider Threat has a number of categories • These categories have a number of strategies associated with them • We see some interrelationships among the categories • Time frame and context are slightly different, but overall, the methods of collection and the “case study” nature make it a good fit • Published in a top journal, ergo, a good model to follow