Skip to main content

Mixed Method for New Scholars with Intrusive, Emerging and Complex Socio-Technical Topics

  • Conference paper
  • First Online:
Knowledge Management in Organizations (KMO 2014)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 185))

Included in the following conference series:

  • 1782 Accesses

Abstract

The literature on security research, such as information security and supply chain security, informs that it is highly intrusive in nature. This creates hindrances to researchers on developing or testing theories in these fields due to difficulties in reaching or recruiting relevant participants for the sample data. This paper proposes mixed method as a research paradigm well suited for such intrusive studies when the researcher is a “newbie”. The proposal is supported by empirical evidence obtained during the data collection of an ongoing research on information security compliance behaviour in supply chain security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mackenzie, N., Knipe, S.: Research dilemmas: paradigms, methods and methodology. Issues Educ. Res. 16(2), 193–205 (2006)

    Google Scholar 

  2. Creswell, J.W.: Qualitative Inquiry and Research Design: Choosing Among Five Approaches. Sage Publications Incorporated, Thousand Oaks (2007)

    Google Scholar 

  3. Creswell, J.W.: Research Design: Quantitative, Qualitative, and Mixed Methods Approaches, 2nd edn. Sage Publications, Thousand Oaks (2003)

    Google Scholar 

  4. Eisenhardt, K.M., Graebner, M.E.: Theory building from cases: opportunities and challenges. Acad. Manag. J. 50(1), 25–32 (2007)

    Article  Google Scholar 

  5. Johnson, R.B., Onwuegbuzie, A.J.: Mixed methods research: a research paradigm whose time has come. Educ. Res. 33(7), 14–26 (2004)

    Article  Google Scholar 

  6. Smith, S., et al.: Circuits of power: a study of mandated compliance to an information systems security de jure standard in a government organization. MIS Q. 34(3), 463–486 (2010)

    Google Scholar 

  7. Kotulic, A.G., Clark, J.G.: Why there aren’t more information security research studies. Inf. Manag. 41(5), 597–607 (2004)

    Article  Google Scholar 

  8. Atkinson, R., Flint, J.: Accessing hidden and hard-to-reach populations: snowball research strategies. Soc. Res. Update 33(1), 1–4 (2001)

    Google Scholar 

  9. Marucheck, A., et al.: Product safety and security in the global supply chain: issues, challenges and research opportunities. J. Oper. Manag. 29(7), 707–720 (2011)

    Article  Google Scholar 

  10. Creswell, J.W.: Research Design. Sage Publications, Thousand Oaks (1994)

    Google Scholar 

  11. Wu, D.-J.: Software agents for knowledge management: coordination in multi-agent supply chains and auctions. Expert Syst. Appl. 20(1), 51–64 (2001)

    Article  Google Scholar 

  12. Nissen, M.E.: Agent-based supply chain integration. Inf. Technol. Manage. 2(3), 289–312 (2001)

    Article  Google Scholar 

  13. Dumas, M., Recker, J.C., Weske, M.: Management and engineering of process aware information systems: introduction to the special issue. Inf. Syst. 37(2), 77–79 (2012)

    Article  Google Scholar 

  14. Yang, Y.-C.: Risk management of Taiwan’s maritime supply chain security. Saf. Sci. 49(3), 382–393 (2011)

    Article  Google Scholar 

  15. Hanson, W.E., et al.: Mixed methods research designs in counseling psychology. J. Couns. Psychol. 52(2), 224 (2005)

    Article  Google Scholar 

  16. Cameron, R.: A sequential mixed model research design: design, analytical and display issues. Int. J. Multiple Res. Approaches 3(2), 140–152 (2009)

    Article  Google Scholar 

  17. Venkatesh, V., Brown, S., Bala, H.: Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems. MIS Q. 37(1), 21–54 (2013)

    Google Scholar 

  18. Johnson, R.B., Onwuegbuzie, A.J., Turner, L.A.: Toward a definition of mixed methods research. J. Mixed Methods Res. 1(2), 112–133 (2007)

    Article  Google Scholar 

  19. Speier, C., et al.: Global supply chain design considerations: mitigating product safety and security risks. J. Oper. Manag. 29(7), 721–736 (2011)

    Article  Google Scholar 

  20. Clark, V.L.P.: The adoption and practice of mixed methods: US trends in federally funded health-related research. Qual. Inq. 16(6), 428–440 (2010)

    Article  Google Scholar 

  21. Bryman, A.: Integrating quantitative and qualitative research: how is it done? Qual. Res. 6(1), 97–113 (2006)

    Article  Google Scholar 

  22. Collins, K.M., Onwuegbuzie, A.J., Sutton, I.L.: A model incorporating the rationale and purpose for conducting mixed methods research in special education and beyond. Learn. Disabil.: Contemp. J. 4(1), 67–100 (2006)

    Google Scholar 

  23. Biernacki, P., Waldorf, D.: Snowball sampling: problems and techniques of chain referral sampling. Sociol. Methods Res. 10(2), 141–163 (1981)

    Google Scholar 

  24. Creswell, J.W., Clark, V.L.P.: Designing and Conducting Mixed Methods Research. Wiley Online Library, New York (2007)

    Google Scholar 

  25. Creswell, J.W., Miller, D.L.: Determining validity in qualitative inquiry. Theor. Pract. 39(3), 124–130 (2000)

    Article  Google Scholar 

  26. Greene, J.C., Caracelli, V.J., Graham, W.F.: Toward a conceptual framework for mixed-method evaluation designs. Educ. Eval. Policy Anal. 11(3), 255–274 (1989)

    Article  Google Scholar 

  27. Burgess, K., Singh, P.J., Koroglu, R.: Supply chain management: a structured literature review and implications for future research. Int. J. Oper. Prod. Manag. 26(7), 703–729 (2006)

    Article  Google Scholar 

  28. Voss, M.D., Whipple, J.M., Closs, D.J.: The role of strategic security: internal and external security measures with security performance implications. Transp. J. (Am. Soc. Transp. Logist. Inc.) 48(2), 5–23 (2009)

    Google Scholar 

  29. Whipple, J.M., Voss, M.D., Closs, D.J.: Supply chain security practices in the food industry: do firms operating globally and domestically differ? Int. J. Phys. Distrib. Logist. Manag. 39(7), 574–594 (2009)

    Article  Google Scholar 

  30. Spears, J.L., Barki, H.: User participation in information systems security risk management. MIS Q. 34(3), 503–A5 (2010)

    Google Scholar 

  31. Hsu, C., Lee, J.-N., Straub, D.W.: Institutional influences on information systems security innovations. Inf. Syst. Res. 23((3-part-2)), 918–939 (2012)

    Article  Google Scholar 

  32. Trkman, P., et al.: The impact of business analytics on supply chain performance. Decis. Support Syst. 49(3), 318–327 (2010)

    Article  Google Scholar 

  33. Lavastre, O., Gunasekaran, A., Spalanzani, A.: Supply chain risk management in French companies. Decis. Support Syst. 52(4), 828–838 (2012)

    Article  Google Scholar 

  34. Marshall, M.N.: Sampling for qualitative research. Fam. Pract. 13(6), 522–526 (1996)

    Article  Google Scholar 

  35. Polkinghorne, D.E.: Language and meaning: Data collection in qualitative research. J. Couns. Psychol. 52(2), 137 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ibrahim Shafiu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Shafiu, I., Wang, W.Y.C., Singh, H. (2014). Mixed Method for New Scholars with Intrusive, Emerging and Complex Socio-Technical Topics. In: Uden, L., Fuenzaliza Oshee, D., Ting, IH., Liberona, D. (eds) Knowledge Management in Organizations. KMO 2014. Lecture Notes in Business Information Processing, vol 185. Springer, Cham. https://doi.org/10.1007/978-3-319-08618-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08618-7_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08617-0

  • Online ISBN: 978-3-319-08618-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics