437
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Literary Sketches in Information Systems Research: Conceptualization and Guidance for Using Vignettes as a Narrative Form

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon

References

  • Alexander, C. S., & Becker, H. J. (1978). The use of vignettes in survey research. Public Opinion Quarterly, 42(1), 93–104. https://doi.org/10.1086/268432
  • Atzmüller, C., & Steiner, P. M. (2010). Experimental vignette studies in survey research. Methodology: European Journal of Research Methods for the Behavioral and Social Sciences, 6(3), 128–138. https://doi.org/10.1027/1614-2241/a000014
  • Aurigemma, S., & Mattson, T. (2019). Generally speaking, context matters: making the case for a change from universal to particular ISP research. Journal of the Association for Information Systems, 20(12), 1700–1742. https://doi.org/10.17705/1jais.00583
  • Bandara, W., Miskon, S., & Fielt, E. (2011). A systematic, tool-supported method for conducting literature reviews in information systems. In Proceedings of the 19th European Conference on Information Systems (ECIS), June 9-11 2011, Helsinki, Finland.
  • Benbasat, I., & Zmud, R. W. (1999). Empirical research in information systems: The practice of relevance. MIS Quarterly, 23(1), 3–16. https://doi.org/10.2307/249403
  • Benlian, A. (2020). A daily field investigation of technology-driven spillovers from work to home. MIS Quarterly, 44(3), 1259–1300. https://doi.org/10.25300/MISQ/2020/14911/
  • Boylu, F., Aytug, H., & Koehler, G. J. (2010). Induction over strategic agents. Information Systems Research, 21(1), 170–189. https://doi.org/10.1287/isre.1090.0272
  • Bui, Q. N., Leo, E., & Adelakun, O. (2019). Exploring complexity and contradiction in information technology outsourcing: A set-theoretical approach. The Journal of Strategic Information Systems, 28(3), 330–355. https://doi.org/10.1016/j.jsis.2019.07.001
  • Carter, M., & Grover, V. (2015). Me, my self, and I(T): Conceptualizing information technology identity and its implications. MIS Quarterly, 39(4), 931–958. https://doi.org/10.25300/MISQ/2015/39.4.9
  • Cecez-Kecmanovic, D., Galliers, R. D., Henfridsson, O., Newell, S., & Vidgen, R. (2014). The sociomateriality of information systems: Current status, future directions. MIS Quarterly, 38(3), 809–830. https://doi.org/10.25300/MISQ/2014/38:3.3
  • Corsair’s Publishing. (2016). The vignette: An effective and evocative case study. https://circa-navigate.corsairs.network/the-vignette-105834f6b89e
  • Craig, K., Thatcher, J. B., Grover, V., & Tha. (2019). The IT identity threat: A conceptual definition and operational measure. Journal of Management Information Systems, 36(1), 259–288. https://doi.org/10.1080/07421222.2018.1550561
  • Cummings, J., & Dennis, A. R. (2018). Virtual first impressions matter: The effect of enterprise social networking sites on impression formation in virtual teams. MIS Quarterly, 42(3), 697–717. https://doi.org/10.25300/MISQ/2018/13202
  • Dennis, A. R., Robert, L. P., Curtis, A. M., Kowalczyk, S. T., & Hasty, B. K. (2012). Trust is in the eye of the beholder: A vignette study of postevent behavioral controls’ effects on individual trust in virtual teams. Information Systems Research, 23(2), 546–558. https://doi.org/10.1287/isre.1110.0364
  • Dobson, J. A., & Nicholson, B. (2017). Exploring the dialectics underlying institutionalization of IT artifacts. Journal of the Association for Information Systems, 18(12), 848–871. https://doi.org/10.17705/1jais.00478
  • Eaton, B., Elaluf-Calderwood, S., Sorensen, C., & Yoo, Y. (2015). Distributed tuning of boundary resources: The case of apple’s iOS service system. MIS Quarterly, 39(1), 217–243. https://doi.org/10.25300/MISQ/2015/39.1.10
  • Erickson, F. (1986). Qualitative methods in research on teaching. In M. C. Wittrock (Ed.), Handbook of research on teaching (3rd ed., pp. 119–161). MacMillan.
  • Ferguson, J. E., & Soekijad, M. (2016). Multiple interests or unified voice? Online communities as intermediary spaces for development. Journal of Information Technology, 31(4), 358–381. https://doi.org/10.1057/jit.2015.25
  • Grønsund, T., & Aanestad, M. (2020). Augmenting the algorithm: Emerging human-in-the-loop work configurations. The Journal of Strategic Information Systems, 29(2), 101614. https://doi.org/10.1016/j.jsis.2020.101614
  • Guo, K. H., Yuan, Y., Archer, N. P., & Connelly, C. E. (2011). Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28(2), 203–236. https://doi.org/10.2753/MIS0742-1222280208
  • Havakhor, T., & Sabherwal, R. (2018). Team processes in virtual knowledge teams: The effects of reputation signals and network density. Journal of Management Information Systems, 35(1), 266–318. https://doi.org/10.1080/07421222.2018.1440755
  • Herodotus, & Godley, A. D. (1920). Herodotus. With an English translation by A.D. Godley. Cambridge: Harvard University Press.
  • Holeman, I., & Barrett, M. (2017). Insights from an ICT4D initiative in Kenya’s immunization program: Designing for the emergence of sociomaterial practices. Journal of the Association for Information Systems, 18(12), 900–930. https://doi.org/10.17705/1jais.00476
  • Huber, T. L., Winkler, M. A., Dibbern, J., & Brown, C. V. (2020). The use of prototypes to bridge knowledge boundaries in agile software development. Information Systems Journal, 30(2), 270–294. https://doi.org/10.1111/isj.12261
  • Hughes, R., & Huby, M. (2002). The application of vignettes in social and nursing research. Journal of Advanced Nursing, 37(4), 382–386. https://doi.org/10.1046/j.1365-2648.2002.02100.x
  • Hughes, R., & Huby, M. (2004). The construction and interpretation of vignettes in social research. Social Work and Social Sciences Review, 11(1), 36–51. https://doi.org/10.1921/17466105.11.1.36
  • Jarzabkowski, P., Bednarek, R., & Lê, J. K. (2014). Producing persuasive findings: Demystifying ethnographic textwork in strategy and organization research. Strategic Organization, 12(4), 274–287. https://doi.org/10.1177/1476127014554575
  • Junglas, I., Goel, L., Ives, B., & Harris, J. (2019). Innovation at work: The relative advantage of using consumer it in the workplace. Information Systems Journal, 29(2), 317–339. https://doi.org/10.1111/isj.12198
  • Kathiresan, J., & Patro, B. K. (2013). Case vignette: A promising complement to clinical case presentations in teaching. Education for Health, 26(1), 21–24. https://doi.org/10.4103/1357-6283.112796
  • Khansa, L., Kuem, J., Siponen, M., & Kim, S. S. (2017). To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls. Journal of Management Information Systems, 34(1), 141–176. https://doi.org/10.1080/07421222.2017.1297173
  • Kietzmann, J., Plangger, K., Eaton, B., Heiligenberg, K., Pitt, L., & Berthon, P. (2013). Mobility at work: A typology of mobile communities of practice and contextual ambidexterity. The Journal of Strategic Information Systems, 22(4), 282–297. https://doi.org/10.1016/j.jsis.2013.03.003
  • Kotlarsky, J., Scarbrough, H., & Oshri, I. (2014). Coordinating expertise across knowledge boundaries in offshore-outsourcing projects. MIS Quarterly, 38(2), 607–627. https://doi.org/10.25300/MISQ/2014/38.2.13
  • Krolak-Schwerdt, S., Hörstermann, T., Glock, S., & Böhmer, I. (2018). Teachers’ assessments of students’ achievements: The ecological validity of studies using case vignettes. The Journal of Experimental Education, 86(4), 515–529. https://doi.org/10.1080/00220973.2017.1370686
  • Lambooij, M., Flache, A., Sanders, K., & Siegers, J. (2007). Encouraging employees to co-operate: The effects of sponsored training and promotion practices on employees’ willingness to work overtime. The International Journal of Human Resource Management, 18(10), 1748–1767. https://doi.org/10.1080/09585190701570932
  • Langley, A. (1999). Strategies for theorizing from process data. Academy of Management Review, 24(4), 691–710. https://doi.org/10.5465/amr.1999.2553248
  • Lanza, M. L., & Carifio, J. (1992). Use of a panel of experts to establish validity for patient assault vignettes. Evaluation Review, 16(1), 82–92. https://doi.org/10.1177/0193841X9201600106
  • Laslett, B. (1999). Personal narratives as sociology. Contemporary Sociology, 28(4), 391–401. https://doi.org/10.2307/2655287
  • Levy, Y., & Ellis, T. J. (2006). A systems approach to conduct an effective literature review in support of information systems research. Informing Science: The International Journal of an Emerging Transdiscipline, 9, 181–212. https://doi.org/10.28945/479
  • Lowry, P. B., Moody, G. D., & Chatterjee, S. (2017). Using IT design to prevent cyberbullying. Journal of Management Information Systems, 34(3), 863–901. https://doi.org/10.1080/07421222.2017.1373012
  • Lowry, P. B., Zhang, J., Moody, G. D., Chatterjee, S., Wang, C., & Wu, T. (2019). An integrative theory addressing cyberharassment in the light of technology-based opportunism. Journal of Management Information Systems, 36(4), 1142–1178. https://doi.org/10.1080/07421222.2019.1661090
  • Marabelli, M., & Galliers, R. D. (2017). A reflection on information systems strategizing: The role of power and everyday practices. Information Systems Journal, 27(3), 347–366. https://doi.org/10.1111/isj.12110
  • Marabelli, M., & Vaast, E. (2020). Unveiling the relevance of academic research: A practice-based view. Information and Organization, 30(3), 100314. https://doi.org/10.1016/j.infoandorg.2020.100314
  • Mazmanian, M., Cohn, M., & Dourish, P. (2014). Dynamic reconfiguration in planetary exploration: A sociomaterial ethnography. MIS Quarterly, 38(3), 831–848. https://doi.org/10.25300/MISQ/2014/38.3.09
  • McKnight, D. H., Liu, P., & Pentland, B. T. (2020). Trust change in information technology products. Journal of Management Information Systems, 37(4), 1015–1046. https://doi.org/10.1080/07421222.2020.1831772
  • Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative data analysis: A methods sourcebook (3rd ed.). SAGE Publications.
  • Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook (2nd ed.). SAGE Publications.
  • Miller, J. G., & Roth, A. V. (1994). A taxonomy of manufacturing strategies. Management Science, 40(3), 285–304. https://doi.org/10.1287/mnsc.40.3.285
  • Mishra, A. N., Anderson, C., Angst, C. M., & Agarwal, R. (2012). Electronic health records assimilation and physician identity evolution: An identity theory perspective. Information Systems Research, 23(3), 738–760. https://doi.org/10.1287/isre.1110.0407
  • Nandhakumar, J., Panourgias, N. S., & Scarbrough, H. (2013). From knowing it to “getting it”: Envisioning practices in computer games development. Information Systems Research, 24(4), 933–955. https://doi.org/10.1287/isre.2013.0482
  • Nickerson, R. C., Varshney, U., & Muntermann, J. (2013). A method for taxonomy development and its application in information systems. European Journal of Information Systems, 22(3), 336–359. https://doi.org/10.1057/ejis.2012.26
  • Niemimaa, M., & Niemimaa, E. (2019). Abductive innovations in information security policy development: An ethnographic study. European Journal of Information Systems, 28(5), 566–589. https://doi.org/10.1080/0960085X.2019.1624141
  • Online Etymological Dictionary. (n.d.). Retrieved April 26, 2020, from https://www.etymonline.com/word/vignette
  • Parmiggiani, E., & Monteiro, E. (2018). Shifting baselines? Recommendations for green IS. In Proceedings of the 39th International Conference on Information Systems (ICIS), December 13-16. San Francisco.
  • Peabody, J. W., Luck, J., Glassman, P., Dresselhaus, T. R., & Lee, M. (2000). Comparison of vignettes, standardized patients, and chart abstraction: A prospective validation study of 3 methods for measuring quality. The Journal of the American Medical Association, 283(13), 1715–1722. https://doi.org/10.1001/jama.283.13.1715
  • Pousti, H., Urquhart, C. [., & Linger, H. (2020). Researching the Virtual: A Framework for Reflexivity in Qualitative Social Media Research. Information Systems Journal, 31(3), 356–383. https://doi.org/10.1111/isj.12314
  • Rehm, S., GoelL., V., & Junglas, I. (2017). Using information systems in innovation networks: Uncovering network resources. Journal of the Association for Information Systems, 18(8), 577–604. https://doi.org/10.17705/1jais.00465
  • Robey, D., & Markus, M. L. (1998). Beyond rigor and relevance: Producing consumable research about information systems. Information Resources Management Journal, 11(1), 7–16. https://doi.org/10.4018/irmj.1998010101
  • Robra-Bissantz, S., & Strahringer, S. (2020). Wirtschaftsinformatik-Forschung für die Praxis. HMD Praxis der Wirtschaftsinformatik, 57(2), 162–188. https://doi.org/10.1365/s40702-020-00603-0
  • Rooks, G., Raub, W., Selten, R., & Tazelaar, F. (2000). How inter-firm co-operation depends on social embeddedness: A vignette study. Acta Sociologica, 43(2), 123–137. https://doi.org/10.1177/000169930004300203
  • Rowe, F. (2014). What literature review is not: Diversity, boundaries and recommendations. European Journal of Information Systems, 23(3), 241–255. https://doi.org/10.1057/ejis.2014.7
  • Schlagwein, D., & Hu, M. (2017). How and why organisations use social media: Five use types and their relation to absorptive capacity. Journal of Information Technology, 32(2), 194–209. https://doi.org/10.1057/jit.2016.7
  • Schryen, G., Benlian, A., Rowe, F., Gregor, S., Larsen, K., Petter, S., Paré, G., Wagner, G., Haag, S., & Yasasin, E. (2017). Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields? Communications of the Association for Information Systems, 41, 759–774. https://doi.org/10.17705/1CAIS.04130
  • Schubert, P., & Legner, C. (2011). B2B integration in global supply chains: An identification of technical integration scenarios. The Journal of Strategic Information Systems, 20(3), 250–267. https://doi.org/10.1016/j.jsis.2011.04.001
  • Schultze, U., & Mason, R. O. (2012). Studying cyborgs: Re-examining internet studies as human subjects research. Journal of Information Technology, 27(4), 301–312. https://doi.org/10.1057/jit.2012.30
  • Stahl, B. (2012). Morality, ethics, and reflection: A categorization of normative IS research. Journal of the Association for Information Systems, 13(8), 636–656. https://doi.org/10.17705/1jais.00304
  • Stein, M., GalliersR. D., K., & Markus, M. L. (2013). Towards an understanding of identity and technology in the workplace. Journal of Information Technology, 28(3), 167–182. https://doi.org/10.1057/jit.2012.32
  • Szopinski, D., Schoormann, T., & Kundisch, D. (2019). Because your taxonomy is worth it: Towards a framework for taxonomy evaluation In Proceedings of the 27th European Conference on Information Systems (ECIS) June 12-14 2019, Stockholm-Uppsala, Sweden.
  • Szopinski, D., Schoormann, T., & Kundisch, D. (2020). Criteria as a prelude for guiding taxonomy evaluation. In Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS), January 7-10 2020, Maui, HI, USA.
  • Tams, S., Dulipovici, A., Thatcher, J. B., Craig, K., & Srite, M. (2020). The role of basic human values in knowledge sharing: How values shape the postadoptive use of electronic knowledge repositories. Journal of the Association for Information Systems, 21(1), 201–237. https://doi.org/10.17705/1jais.00597
  • Tams, S., Grover, V., & Thatcher, J. B. (2014). Modern information technology in an old workforce: Toward a strategic research agenda. The Journal of Strategic Information Systems, 23(4), 284–304. https://doi.org/10.1016/j.jsis.2014.10.001
  • Tams, S., Thatcher, J. B., & Craig, K. (2018). How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy. The Journal of Strategic Information Systems, 27(2), 170–190. https://doi.org/10.1016/j.jsis.2017.07.004
  • Tams, S., Thatcher, J. B., & Grover, V. (2018). Concentration, competence, confidence, and capture: An experimental study of age, interruption-based technostress, and task performance. Journal of the Association for Information Systems, 19(9), 857–908. https://doi.org/10.17705/1jais.00511
  • Thompson, S., Whitaker, J., Kohli, R., & Jones, C. (2020). Chronic disease management: How IT and analytics create healthcare value through the temporal displacement of care. MIS Quarterly, 44(1), 227–256. https://doi.org/10.25300/MISQ/2020/15085
  • Urquhart, C. (2001). Bridging information requirements and information needs assessment: Do scenarios and vignettes provide a link? Information Research, 6(2). http://informationr.net/ir/6-2/paper102.html
  • Vaast, E., Safadi, H., Lapointe, L., & Negoita, B. (2017). Social media affordances for connective action: An examination of microblogging use during the gulf of mexico oil spill. MIS Quarterly, 41(4), 1179–1205. https://doi.org/10.25300/MISQ/2017/41.4.08
  • Velu, C. K., Madnick, S. E., & Van Alstyne, M. W. (2013). Centralizing data management with considerations of uncertainty and information-based flexibility. Journal of Management Information Systems, 30(3), 179–212. https://doi.org/10.2753/MIS0742-1222300307
  • Vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., & Cleven, A. (2009). Reconstructing the giant: On the importance of rigour in documenting the literature search process. In Proceedings of the 17th European Conference on Information Systems (ECIS), June 8-10 2009, Verona, Italy.
  • Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 26(2), xiii–xxiii.
  • Yeow, A., Sia, S. K., Soh, C., & Chua, C. (2018). Boundary organization practices for collaboration in enterprise integration. Information Systems Research, 29(1), 149–168. https://doi.org/10.1287/isre.2017.0743
  • Yin, R. K. (2013). Case study research: design and methods (5th ed.). SAGE Publications.
  • Zamani, E. D., & Pouloudi, N. (2021). Generative mechanisms of workarounds, discontinuance and reframing: A study of negative disconfirmation with consumerised IT. Information Systems Journal, 31(3), 384–428. https://doi.org/10.1111/isj.12315
  • Zeiss, R., Recker, J. C., & Müller, M. (2019). Hardware-layer dynamics in mobile platform ecosystems: The case of apple’s iPhone aftermarket. In Proceedings of the 40th International Conference on Information Systems (ICIS), December 15-18 2019, Munich, Germany.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.