A Framework for Rigorously Identifying Research Gaps in Qualitative Literature Reviews
暂无分享,去创建一个
[1] Michael R. Wade,et al. A Comprehensive Review and Synthesis of Open Source Research , 2010, J. Assoc. Inf. Syst..
[2] Tejaswini Herath,et al. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..
[3] Carl Auerbach,et al. Qualitative Data: An Introduction to Coding and Analysis , 2003 .
[4] Anand Jeyaraj,et al. A review of the predictors, linkages, and biases in IT innovation adoption research , 2006, J. Inf. Technol..
[5] Manju K. Ahuja. Women in the information technology profession: a literature review, synthesis and research agenda , 2002, Eur. J. Inf. Syst..
[6] A. Eagly,et al. Using research syntheses to plan future research. , 1994 .
[7] Angelika Dimoka,et al. On the Use of Neuropyhsiological Tools in IS Research: Developing a Research Agenda for NeuroIS , 2012, MIS Q..
[8] Frantz Rowe,et al. Strategizing information systems-enabled organizational transformation: A transdisciplinary review and new directions , 2012, J. Strateg. Inf. Syst..
[9] Joshua C. Collins,et al. The Handbook of Scholarly Writing and Publishing , 2012 .
[10] N. Hoffart. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .
[11] E. B. Swanson,et al. Information systems innovation among organizations , 1994 .
[12] Janek Richter,et al. Towards mindful case study research in IS: a critical analysis of the past ten years , 2014, Eur. J. Inf. Syst..
[13] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[14] Andrea Bergmann. Doing A Literature Review Releasing The Social Science Research Imagination , 2016 .
[15] Ulrike Schultze,et al. Embodiment and presence in virtual worlds: a review , 2010, J. Inf. Technol..
[16] Björn Niehaves,et al. Reconstructing the giant: On the importance of rigour in documenting the literature search process , 2009, ECIS.
[17] Arlene Fink,et al. Conducting research literature reviews : from the internet to paper , 2014 .
[18] Terry Anthony Byrd,et al. The Neglected Continent of IS Research: A Research Agenda for Sub-Saharan Africa , 2005, J. Assoc. Inf. Syst..
[19] David S. Preston,et al. Information Systems Strategy: Reconceptualization, Measurement, and Implications , 2010, MIS Q..
[20] Graham Pervan,et al. A critical analysis of decision support systems research , 2005, J. Inf. Technol..
[21] Blake Ives,et al. Review: IT-Dependent Strategic Initiatives and Sustained Competitive Advantage: A Review and Synthesis of the Literature , 2005, MIS Q..
[22] Roy F. Baumeister,et al. Writing a literature review , 2013 .
[23] Kieran Conboy,et al. Agility from First Principles: Reconstructing the Concept of Agility in Information Systems Development , 2009, Inf. Syst. Res..
[24] Mary Tate,et al. A Descriptive Literature Review and Classification of Cloud Computing Research , 2012, Commun. Assoc. Inf. Syst..
[25] Michael J. Baker,et al. WRITING A LITERATURE REVIEW , 2000 .
[26] N. Eberhardt. Conducting Research Literature Reviews From The Internet To Paper , 2016 .
[27] Saonee Sarker,et al. ICT innovation in emerging economies: a review of the existing literature and a framework for future research , 2013, J. Inf. Technol..
[28] Leslie P. Willcocks,et al. A review of the IT outsourcing empirical literature and future research directions , 2010, J. Inf. Technol..
[29] Sebastian Spaeth,et al. Carrots and Rainbows: Motivation and Social Practice in Open Source Software Development , 2012, MIS Q..
[30] Richard Whittington,et al. Information Systems Strategy and Strategy-as-Practice: A joint agenda , 2014, J. Strateg. Inf. Syst..
[31] Frantz Rowe,et al. What literature review is not: diversity, boundaries and recommendations , 2014, Eur. J. Inf. Syst..
[32] C. Brodsky. The Discovery of Grounded Theory: Strategies for Qualitative Research , 1968 .
[33] Ali Sunyaev,et al. Determinant factors of cloud-sourcing decisions: reflecting on the IT outsourcing literature in the era of cloud computing , 2016, J. Inf. Technol..
[34] Detmar W. Straub,et al. Critical themes in electronic commerce research: a meta-analysis , 2005, J. Inf. Technol..
[35] Karen A Robinson,et al. Development of a framework to identify research gaps from systematic reviews. , 2011, Journal of clinical epidemiology.
[36] France Bélanger,et al. Digitizing Government Interactions with Constituents: An Historical Review of E-Government Research in Information Systems , 2012, J. Assoc. Inf. Syst..
[37] Yogesh Kumar Dwivedi,et al. The diffusion and use of institutional theory: a cross-disciplinary longitudinal literature survey , 2009, J. Inf. Technol..
[38] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[39] Kenneth L. Kraemer,et al. Review: Information Technology and Organizational Performance: An Integrative Model of IT Business Value , 2004, MIS Q..
[40] Dorothy E. Leidner,et al. Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict , 2006, MIS Q..
[41] Andrew B. Whinston,et al. Research Commentary: Introducing a Third Dimension in Information Systems Design - The Case for Incentive Alignment , 2001, Inf. Syst. Res..
[42] Kevin Crowston,et al. Information technology and the transformation of industries: three research perspectives , 2004, J. Strateg. Inf. Syst..
[43] Guido Schryen,et al. Revisiting IS business value research: what we already know, what we still need to know, and how we can get there , 2013, Eur. J. Inf. Syst..
[44] C. Hart. Doing a literature review: releasing the social science research imagination. , 1998 .
[45] Dorothy E. Leidner,et al. Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..
[46] Sandra Slaughter,et al. Research Commentary - The Design, Use, and Consequences of Virtual Processes , 2010, Inf. Syst. Res..
[47] Graeme G. Shanks,et al. How Does Enterprise Architecture Add Value to Organisations? , 2011, Commun. Assoc. Inf. Syst..
[48] Kalle Lyytinen,et al. Research Commentary - Digital Infrastructures: The Missing IS Research Agenda , 2010, Inf. Syst. Res..
[49] Chrisanthi Avgerou,et al. Information systems in developing countries: a critical research review , 2008, J. Inf. Technol..
[50] J. Gosby. MEDIA REVIEWS: Basics of Qualitative Research - Techniques and Procedures for Developing Grounded Theory 2nd Edition by A. Strauss and J. Corbin. Sage Publications, , 2000 .
[51] Nittaya Campbell,et al. Improving The Writing Of Literature Reviews Through A Literature Integration Exercise , 2006 .
[52] Jason Bennett Thatcher,et al. Modern information technology in an old workforce: Toward a strategic research agenda , 2014, J. Strateg. Inf. Syst..
[53] Leslie P. Willcocks,et al. Business process outsourcing studies: a critical review and research directions , 2011, J. Inf. Technol..
[54] Thanos Papadopoulos,et al. Information systems strategy: Past, present, future? , 2012, J. Strateg. Inf. Syst..
[55] Izak Benbasat,et al. E-Commerce Product Recommendation Agents: Use, Characteristics, and Impact , 2007, MIS Q..
[56] Elfi Furtmueller,et al. Using grounded theory as a method for rigorously reviewing literature , 2013, Eur. J. Inf. Syst..
[57] Paul A. Pavlou,et al. State of the information privacy literature: where are we now and where should we go? , 2011 .
[58] J. Atkinson,et al. Grounded theory research: literature reviewing and reflexivity. , 2007, Journal of advanced nursing.
[59] Mike Chiasson,et al. Pluralist action research: a review of the information systems literature * , 2009, Inf. Syst. J..
[60] H. Cooper. Organizing knowledge syntheses: A taxonomy of literature reviews , 1988 .
[61] Izak Benbasat,et al. A Research Agenda for Trust in Online Environments , 2008, J. Manag. Inf. Syst..
[62] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[63] Yair Levy,et al. A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research , 2006, Informing Sci. Int. J. an Emerg. Transdiscipl..
[64] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[65] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[66] Shahper Vodanovich,et al. Research Commentary - Digital Natives and Ubiquitous Information Systems , 2010, Inf. Syst. Res..
[67] Elena Maceviciute,et al. Review of: Einspruch, Eric L. An introductory guide to SPSS® for Windows®. 2nd ed. Thousand Oaks, CA: Sage Publications, 2005 , 2006, Inf. Res..