1,403
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Positivist Information Systems Action Research: Methodological Issues

References

  • Argyris, C., and Schön, D.A. Organizational Learning: A Theory of Action Perspective. Reading, MA: Addison-Wesley, 1978.
  • Avison, D.; Davison, R.; and Malaurent, J. Information systems action research: Debunking myths and overcoming barriers. Information and Management (May 2017). Available at: https://doi-org.ezproxy.brunel.ac.uk/10.1016/j.im.2017.05.004.
  • Baskerville, R., and Myers, M.D. Special issue on action research in information systems: Making IS research relevant to practice. MIS Quarterly, 28, 3 (2004), 329–335.
  • Baskerville, R., and Wood-Harper, A.T. Diversity in information systems action research methods. European Journal of Information Systems, 7, 2 (1998), 90–107.
  • Bittner, E.A.C., and Leimeister, J.M. Creating shared understanding in heterogeneous work groups: Why it matters and how to achieve it. Journal of Management Information Systems, 31, 1 (2014), 111–144.
  • Bremmer, I. The J Curve: A New Way to Understand Why Nations Rise and Fall. New York, NY: Simon and Schuster, 2007.
  • Chau, P.Y. An empirical assessment of a modified technology acceptance model. Journal of Management Information Systems, 13, 2 (1996), 185–204.
  • Checkland, P., and Scholes, J. Soft Systems Methodology in Action. Chichester, UK: Wiley, 1990.
  • Clarke, K.A. The phantom menace: Omitted variable bias in econometric research. Conflict Management and Peace Science, 22, 4 (2005), 341–352.
  • Davison, R.; Martinsons, M.G.; and Ou, C.X. The roles of theory in canonical action research. MIS Quarterly, 36, 3 (2012), 763–786.
  • Den Hengst, M., and De Vreede, G-J. Collaborative business engineering: A decade of lessons from the field. Journal of Management Information Systems, 20, 4 (2004), 85–113.
  • Eldon, M., and Chisholm, R. Action research special issue. Human Relations, 46, 10 (1993).
  • Fruhling, A., and De Vreede, G-J. Field experiences with eXtreme programming: Developing an emergency response system. Journal of Management Information Systems, 22, 4 (2006), 39–68.
  • Grilli, L., and Rampichini, C. The role of sample cluster means in multilevel models. Methodology, 7, 4 (2011), 121–133.
  • Guo, K.H.; Yuan, Y.; Archer, N.P.; and Connelly, C.E. Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28, 2 (2011), 203–236.
  • Hox, J.J.; Moerbeek, M.; and van de Schoot, R. Multilevel Analysis: Techniques and Applications. New York, NY: Routledge, 2010.
  • Klein, K.J., and Kozlowski, S.W. From micro to meso: Critical steps in conceptualizing and conducting multilevel research. Organizational Research Methods, 3, 3 (2000), 211–236.
  • Kline, R.B. Principles and Practice of Structural Equation Modeling. New York, NY: Guilford Press, 2010.
  • Kock, N. The three threats of action research: A discussion of methodological antidotes in the context of an information systems study. Decision Support Systems, 37, 2 (2004), 265–286.
  • Kock, N. Common method bias in PLS-SEM: A full collinearity assessment approach. International Journal of e-Collaboration, 11, 4 (2015), 1–10.
  • Kock, N., and Gaskins, L. Simpson’s paradox, moderation, and the emergence of quadratic relationships in path models: An information systems illustration. International Journal of Applied Nonlinear Science, 2, 3 (2016), 200–234.
  • Kock, N., and Gaskins, L. The mediating role of voice and accountability in the relationship between Internet diffusion and government corruption in Latin America and Sub-Saharan Africa. Information Technology for Development, 20, 1 (2014), 23–43.
  • Kock, N., and Hadaya, P. Minimum sample size estimation in PLS‐SEM: The inverse square root and gamma‐exponential methods. Information Systems Journal (forthcoming).
  • Kock, N., and Lau, F. Information systems action research: Serving two demanding masters. Information Technology and People, 14, 1 (2001), 6–12.
  • Kock, N., and Lynn, G.S. Lateral collinearity and misleading results in variance-based SEM: An illustration and recommendations. Journal of the Association for Information Systems, 13, 7 (2012), 546–580.
  • Malaurent, J., and Avison, D. Reconciling global and local needs: A canonical action research project to deal with workarounds. Information Systems Journal, 26, 3 (2016), 227–257.
  • Maruyama, G.M. Basics of Structural Equation Modeling. Thousand Oaks, CA: Sage, 1998.
  • Mumford, E. The story of socio‐technical design: Reflections on its successes, failures and potential. Information Systems Journal, 16, 4 (2006), 317–342.
  • Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.Y.; and Podsakoff, N.P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 5 (2003), 879–903.
  • Rose, A.K., and Yellen, J.L. Is there a J-curve? Journal of Monetary Economics, 24, 1 (1989), 53–68.
  • Schmitz, K.W.; Teng, J.T.; and Webb, K.J. Capturing the complexity of malleable IT use: Adaptive structuration theory for individuals. Management Information Systems Quarterly, 40, 3 (2016), 663–686.
  • Straub, D., and Ang, S. Editor’s comments: Rigor and relevance in is research: redefining the debate and a call for future research. MIS Quarterly, 35, 1 (2011), iii–xi.
  • Susman, G.I., and Evered, R.D. An assessment of the scientific merits of action research. Administrative Science Quarterly (1978), 23, 4 582–603.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.