2019
DOI: 10.1111/isj.12244
|View full text |Cite
|
Sign up to set email alerts
|

Deliberate storytelling in big data analytics adoption

Abstract: The emergence of big data analytics (BDA) has posed opportunities as well as multiple challenges to business practitioners, who have called for research on the behavioural factors underlying BDA adoption at the individual level. The purpose of this study is to extend the information systems (IS) research on storytelling and to explore the role and characteristics of deliberate storytelling in individual‐level BDA adoption. This case study used the grounded theory approach to extract qualitative data from 24 in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(28 citation statements)
references
References 67 publications
(182 reference statements)
0
28
0
Order By: Relevance
“…We coded the concepts independently, such as ‘policy length’ and ‘policy clarity’, but as we continued our analysis, we began to recognize a pattern that was being highlighted by interviewees in regard to the overall method their organizations used to communicate security policy requirements, which also included related concepts such as ‘communication medium’ and ‘communication format’. As a result, we followed the technique used by Boldosova (2019), Corley and Gioia (2004), and Wessel et al (2019) by grouping the lower level, first‐order concepts within a broader, second‐order sub‐category, in this case pertaining to the ‘method of communicating security policy requirements’. These sub‐categories were then combined to form aggregate categories.…”
Section: Methodsmentioning
confidence: 99%
“…We coded the concepts independently, such as ‘policy length’ and ‘policy clarity’, but as we continued our analysis, we began to recognize a pattern that was being highlighted by interviewees in regard to the overall method their organizations used to communicate security policy requirements, which also included related concepts such as ‘communication medium’ and ‘communication format’. As a result, we followed the technique used by Boldosova (2019), Corley and Gioia (2004), and Wessel et al (2019) by grouping the lower level, first‐order concepts within a broader, second‐order sub‐category, in this case pertaining to the ‘method of communicating security policy requirements’. These sub‐categories were then combined to form aggregate categories.…”
Section: Methodsmentioning
confidence: 99%
“…As business complexity and uncertainty increase, firms rely to a lesser extent on existing knowledge and instead attempt to rapidly create new knowledge (Chen et al, 2012; Ma & Agarwal, 2007; Majchrzak & Malhotra, 2016); this condition enhances the importance of and reliance on big data for firm success. Importantly, the new insights and knowledge obtained from big data can serve to improve firm decision‐making quality (Boldosova, 2019; Brown, Abbasi, & Lau, 2015; Ghasemaghaei et al, 2018) and the value extracted from big data (Cavaliere, Lombardi, & Giustiniano, 2015). Therefore, big data is an important input or resource for knowledge creation (Côrte‐Real, Oliveira, & Ruivo, 2017).…”
Section: Conceptual Backgroundmentioning
confidence: 99%
“…In (11), the nodes of a top network come from these subnetworks. In (12), an operator computes the edge set between the nodes of two networks. In ( 13) and ( 14), if there are edges between two networks, an edge is added to the edge set of the top network.…”
Section: Complexitymentioning
confidence: 99%
“…In the era of big data, the bridge of data and qualitative methods emerge in industries [11]. Data storytelling case studies become a vital stream of qualitative researches [12,13]. In this study, we take the Japanese maritime network in the global maritime network and interact with various other maritime networks as a case that consists of a series of analysis driven by the data system and network analysis methods (see Section 3).…”
Section: Introductionmentioning
confidence: 99%