ABSTRACT
This paper introduces and exemplifies the Extended Case Method in Information Systems research. Furthermore, the article provides criteria for evaluating the method. The main argument of the study is that the ECM is ideal for reconstructing a known theory to a new context; particularly, when the objective is to theorize how different information systems respond to that context. The method promotes a "systemic significance" based on the topology of those systems rather than a statistical significance. The study provides the background of the ECM and argues its differences from alternative interpretative research methods in IS. After that, the paper elaborates an illustration of how to support the theoretical and practical relevance of the context, the selection of the theory, the commonalities and differences among information systems, and the extension of the theory, in research guided by the ECM.
- Alter, S. 2013. "Work system theory: overview of core concepts, extensions, and challenges for the future," Journal of the Association for Information (14:2), pp.1.Google Scholar
- Alter, S. 2015. "The concept of "IT artifact" has outlived its usefulness and should be retired now," Information Systems Journal (25:1), pp. 47--60.Google Scholar
- Atwater, J. B., Kannan, V. R., and Stephens, A. A. 2008. "Cultivating systemic thinking in the next generation of business leaders," Academy of Management Learning & Education (7:1), pp. 9--25.Google Scholar
- Baskerville, R. L., and Myers, M. D. 2002. "Information Systems as a reference discipline," MIS Quarterly (26:1), pp. 1--14.Google Scholar
- Benbasat, I., and Zmud, R. W. 2003. "The identity crisis within the IS discipline: defining and communicating the discipline's core properties," MIS Quarterly (27:2), pp. 183--194.Google Scholar
- Bjerregaard, T., and Klitmøller, A. 2016. "Conflictual practice sharing in the MNC: a theory of practice approach," Organization Studies (37:9), pp. 1271--1295.Google Scholar
- Bloor, M., and Wood, F. 2006. Keywords in qualitative methods: a vocabulary of research concepts, SAGE.Google Scholar
- Burawoy, M. 1991. "The extended case method," in Ethnography unbound: power and resistance in the modern metropolis, Berkeley and Los Angeles: University of California Press, pp. 271--287.Google Scholar
- Burawoy, M. 1998. "The Extended Case Method," Sociological Theory (16:1), pp. 4--33.Google Scholar
- Burton-Jones, A., McLean, E. R., and Monod, E. 2015. "Theoretical perspectives in IS research: from variance and process to conceptual latitude and conceptual fit," European Journal of Information Systems (24:6), pp. 664--679.Google ScholarCross Ref
- Ciuk, S., Koning, J., and Kostera, M. 2018. "Organizational ethnographies," in The SAGE Handbook of Qualitative Business and Management Research Methods, Cassel, C., Cunliffe, A. K., and Grandy, G. (eds.), Thousand Oaks, California; London: SAGE Publications, pp. 270--285.Google Scholar
- Corlett, S., and Mavin, S. 2018. "Reflexivity and researcher positionality," in The SAGE Handbook of Qualitative Business and Management Research Methods, Cassell, C., Cunliffe, A. L., and Grandy, G. (ed.), Thousand Oaks, California; London: SAGE Publications, pp. 377--399.Google Scholar
- Danneels, E. 2007. "The process of technological competence leveraging," Strategic Management Journal (28:5), pp. 511--533.Google Scholar
- Danneels, E. 2011. "Trying to become a different type of company: dynamic capability at Smith Corona," Strategic Management Journal (32:1), pp. 1--31.Google Scholar
- Davison, R. M., Martinsons, M. G., and Ou, C. X. J. 2012. "The roles of theory in canonical action research," MIS Quarterly (36:3), pp. 763--786.Google Scholar
- Glaser, B. G., and Strauss, A. L. 1967. The discovery of grounded theory: strategies for qualitative research, Chicago: Aldine Publishing Company.Google Scholar
- Hassan, N. R. 2011. "Is information systems a discipline? Foucauldian and Toulminian insights," European Journal of Information Systems (20:4), pp. 456--476.Google Scholar
- Hassan, N. R. 2014. "Paradigm lost... paradigm gained: a hermeneutical rejoinder to Banville and Landry's 'Can the Field of MIS be Disciplined?'" European Journal of Information Systems (23:6), pp. 600--615.Google Scholar
- Hirschheim, R. A. 1985. "Information systems epistemology: a historical perspective," in Research Methods in Information Systems, M.E (ed.), North Holland: Elsevier Science Publisher B. V., pp. 13--35.Google Scholar
- Hirschheim, R., and Klein, H. K. 2012. "A glorious and not-so-short history of the information systems field," Journal of the Association for Information Systems (13:4), pp. 188--235.Google ScholarCross Ref
- Holton, J. A. 2018. "From Grounded Theory to grounding theorizing in qualitative research," in The SAGE Handbook of Qualitative Business and Management Research Methods, Cassel, C., Cunliffe, A. K., and Grandy, G. (eds.), Thousand Oaks, California; London: SAGE Publications, pp. 233--250.Google Scholar
- Lee, A. S., and Hubona, G. S. 2009. "A scientific basis for rigor in Information Systems research," MIS Quarterly (33:2), pp. 237--262.Google Scholar
- Luo, H., Luo, W., and Strong, D. 2000. "Perceived critical mass effect on groupware acceptance," European Journal of Information Systems (9:2), pp. 91--103.Google Scholar
- Gluckman, M. 1958. Analysis of a social situation in modern Zululand, Manchester: Manchester University Press.Google Scholar
- Myers, M. D. 1999. "Investigating Information Systems with Ethnographic Research," Communications of the Association for Information Systems (2:23), pp. 1--20.Google Scholar
- Nevo, S., Nevo, D., and Ein-dor, P. 2009. "Thirty years of IS research: core artifacts and academic identity thirty years of IS research: core artifacts and academic identity thirty years of IS research: artifacts and academic identity," Communications of the Association for Information Systems (25:24), pp. 221--242.Google Scholar
- Orlikowski, W. J., and Iacono, C. S. 2001. "Desperately seeking the "IT" in IT research - a call to theorizing the IT artefact," Information Systems Research (12:2), pp. 121--134.Google Scholar
- Prasarnphanich, P., and Wagner, C. 2008. "Creating critical mass in collaboration systems: Insights from Wikipedia," in Proceedings of the IEEE International Conference on Digital Ecosystems and Technologies, pp. 126--130.Google Scholar
- Prasarnphanich, P., and Wagner, C. 2011. "Explaining the sustainability of digital ecosystems based on the Wiki model through Critical Mass Theory," IEEE Transactions on Industrial Electronics, (58:6), pp. 2065--2072.Google Scholar
- Scaratti, G., Gorli, M., Galuppo, L., and Ripamonti, S. 2018. "Action Research: knowing and changing (in) organizational contexts," in The SAGE Handbook of Qualitative Business and Management Research Methods, Cassell, C., Cunliffe, A. L., and Grandy, G. (ed.), Thousand Oaks, California; London: SAGE Publications, pp. 286--307.Google Scholar
- Ragin, C. C. 1994a. "The Process of social research: Ideas and evidence," in Constructing social research: The unity and diversity of method. Thousand Oaks, CA, US: Pine Forge Press, pp. 55--76.Google Scholar
- Ragin, C. C. 1994b. "Using qualitative methods to study commonalities," in Constructing Social Research: The Unity and Diversity of Method, Thousand Oaks, California: Pine Forge Press, pp. 81--103.Google Scholar
- Taylor, H., Dillon, S., and van Wingen, M. 2010. "Focus and diversity in Information Systems research: meeting the dual demands of a healthy applied discipline," Management Information Systems Quarterly, (34:4), pp. 647--667.Google Scholar
- Urquhart, C., Lehmann, H., and Myers, M. D. 2010. "Putting the 'theory' back into grounded theory: Guidelines for grounded theory studies in information systems," Information Systems Journal (20:4), pp. 357--381.Google Scholar
- Van Slyke, C., Ilie, V., Lou, H. and Stafford, T. 2007. "Perceived critical mass and the adoption of a communication technology," European Journal of Information Systems (16:3), pp. 270--283.Google ScholarCross Ref
- Venable, J., Pries-Heje, J., and Baskerville, R. 2016. "FEDS: a framework for evaluation in design science research," European Journal of Information Systems (25:1), pp. 77--89.Google ScholarCross Ref
- Wade, M., Biehl, M., and Kim, H. 2006. "Not Information Systems is ^ a Reference Discipline (And What We Can Do About It)," Journal of the Association for Information Systems (7:5), pp. 247--269.Google ScholarCross Ref
- Wadham, H., and Warren, R. C. 2014. "Telling organizational tales: The extended case method in practice," Organizational Research Methods (17:1), pp. 5--22.Google Scholar
- Walsham, G. 1995a. "Interpretative case studies in IS research: nature and method," European Journal of Information Systems (4:2), pp. 74--81.Google Scholar
- Walsham, G. 1995b. "The emergence of interpretivism in IS research," Information Systems Research (6:4), pp. 376--394.Google Scholar
- Walton, J. 1992. "Making the Theoretical Case," in What is a Case? C. C.Ragin and H. S.Becker (eds.), New York: Cambridge University Press, pp. 121--137.Google Scholar
- Yin, R. K. 1994. Case study research: design and methods, Thousand Oaks, CA, US: Sage Press.Google Scholar
Recommendations
Investigating the integration of SMEs' information systems: an exploratory case study
The need for business to exchange real-time information has grown since the adoption of e-commerce technology. To address this need, organisations might have to integrate their IT infrastructures. Until now, integration is frequently cited as being a ...
Case Studies in Developing Contextualising Information Systems
CONTEXT '01: Proceedings of the Third International and Interdisciplinary Conference on Modeling and Using ContextContextualisation of information is done for at least two different purposes: (1) contextualisation approaches address problems of information overload by filtering information appropriate in a certain context. (2) The presentation of information ...
Giddens's structuration theory and information systems research
The work of the contemporary British sociologist Anthony Giddens, and in particular his structuration theory, has been widely cited by Information Systems researchers. This paper presents a critical review of the work of Giddens and its application in ...
Comments