Abstract
The literature on security research, such as information security and supply chain security, informs that it is highly intrusive in nature. This creates hindrances to researchers on developing or testing theories in these fields due to difficulties in reaching or recruiting relevant participants for the sample data. This paper proposes mixed method as a research paradigm well suited for such intrusive studies when the researcher is a “newbie”. The proposal is supported by empirical evidence obtained during the data collection of an ongoing research on information security compliance behaviour in supply chain security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mackenzie, N., Knipe, S.: Research dilemmas: paradigms, methods and methodology. Issues Educ. Res. 16(2), 193–205 (2006)
Creswell, J.W.: Qualitative Inquiry and Research Design: Choosing Among Five Approaches. Sage Publications Incorporated, Thousand Oaks (2007)
Creswell, J.W.: Research Design: Quantitative, Qualitative, and Mixed Methods Approaches, 2nd edn. Sage Publications, Thousand Oaks (2003)
Eisenhardt, K.M., Graebner, M.E.: Theory building from cases: opportunities and challenges. Acad. Manag. J. 50(1), 25–32 (2007)
Johnson, R.B., Onwuegbuzie, A.J.: Mixed methods research: a research paradigm whose time has come. Educ. Res. 33(7), 14–26 (2004)
Smith, S., et al.: Circuits of power: a study of mandated compliance to an information systems security de jure standard in a government organization. MIS Q. 34(3), 463–486 (2010)
Kotulic, A.G., Clark, J.G.: Why there aren’t more information security research studies. Inf. Manag. 41(5), 597–607 (2004)
Atkinson, R., Flint, J.: Accessing hidden and hard-to-reach populations: snowball research strategies. Soc. Res. Update 33(1), 1–4 (2001)
Marucheck, A., et al.: Product safety and security in the global supply chain: issues, challenges and research opportunities. J. Oper. Manag. 29(7), 707–720 (2011)
Creswell, J.W.: Research Design. Sage Publications, Thousand Oaks (1994)
Wu, D.-J.: Software agents for knowledge management: coordination in multi-agent supply chains and auctions. Expert Syst. Appl. 20(1), 51–64 (2001)
Nissen, M.E.: Agent-based supply chain integration. Inf. Technol. Manage. 2(3), 289–312 (2001)
Dumas, M., Recker, J.C., Weske, M.: Management and engineering of process aware information systems: introduction to the special issue. Inf. Syst. 37(2), 77–79 (2012)
Yang, Y.-C.: Risk management of Taiwan’s maritime supply chain security. Saf. Sci. 49(3), 382–393 (2011)
Hanson, W.E., et al.: Mixed methods research designs in counseling psychology. J. Couns. Psychol. 52(2), 224 (2005)
Cameron, R.: A sequential mixed model research design: design, analytical and display issues. Int. J. Multiple Res. Approaches 3(2), 140–152 (2009)
Venkatesh, V., Brown, S., Bala, H.: Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems. MIS Q. 37(1), 21–54 (2013)
Johnson, R.B., Onwuegbuzie, A.J., Turner, L.A.: Toward a definition of mixed methods research. J. Mixed Methods Res. 1(2), 112–133 (2007)
Speier, C., et al.: Global supply chain design considerations: mitigating product safety and security risks. J. Oper. Manag. 29(7), 721–736 (2011)
Clark, V.L.P.: The adoption and practice of mixed methods: US trends in federally funded health-related research. Qual. Inq. 16(6), 428–440 (2010)
Bryman, A.: Integrating quantitative and qualitative research: how is it done? Qual. Res. 6(1), 97–113 (2006)
Collins, K.M., Onwuegbuzie, A.J., Sutton, I.L.: A model incorporating the rationale and purpose for conducting mixed methods research in special education and beyond. Learn. Disabil.: Contemp. J. 4(1), 67–100 (2006)
Biernacki, P., Waldorf, D.: Snowball sampling: problems and techniques of chain referral sampling. Sociol. Methods Res. 10(2), 141–163 (1981)
Creswell, J.W., Clark, V.L.P.: Designing and Conducting Mixed Methods Research. Wiley Online Library, New York (2007)
Creswell, J.W., Miller, D.L.: Determining validity in qualitative inquiry. Theor. Pract. 39(3), 124–130 (2000)
Greene, J.C., Caracelli, V.J., Graham, W.F.: Toward a conceptual framework for mixed-method evaluation designs. Educ. Eval. Policy Anal. 11(3), 255–274 (1989)
Burgess, K., Singh, P.J., Koroglu, R.: Supply chain management: a structured literature review and implications for future research. Int. J. Oper. Prod. Manag. 26(7), 703–729 (2006)
Voss, M.D., Whipple, J.M., Closs, D.J.: The role of strategic security: internal and external security measures with security performance implications. Transp. J. (Am. Soc. Transp. Logist. Inc.) 48(2), 5–23 (2009)
Whipple, J.M., Voss, M.D., Closs, D.J.: Supply chain security practices in the food industry: do firms operating globally and domestically differ? Int. J. Phys. Distrib. Logist. Manag. 39(7), 574–594 (2009)
Spears, J.L., Barki, H.: User participation in information systems security risk management. MIS Q. 34(3), 503–A5 (2010)
Hsu, C., Lee, J.-N., Straub, D.W.: Institutional influences on information systems security innovations. Inf. Syst. Res. 23((3-part-2)), 918–939 (2012)
Trkman, P., et al.: The impact of business analytics on supply chain performance. Decis. Support Syst. 49(3), 318–327 (2010)
Lavastre, O., Gunasekaran, A., Spalanzani, A.: Supply chain risk management in French companies. Decis. Support Syst. 52(4), 828–838 (2012)
Marshall, M.N.: Sampling for qualitative research. Fam. Pract. 13(6), 522–526 (1996)
Polkinghorne, D.E.: Language and meaning: Data collection in qualitative research. J. Couns. Psychol. 52(2), 137 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Shafiu, I., Wang, W.Y.C., Singh, H. (2014). Mixed Method for New Scholars with Intrusive, Emerging and Complex Socio-Technical Topics. In: Uden, L., Fuenzaliza Oshee, D., Ting, IH., Liberona, D. (eds) Knowledge Management in Organizations. KMO 2014. Lecture Notes in Business Information Processing, vol 185. Springer, Cham. https://doi.org/10.1007/978-3-319-08618-7_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-08618-7_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08617-0
Online ISBN: 978-3-319-08618-7
eBook Packages: Computer ScienceComputer Science (R0)