2014
DOI: 10.17705/1jais.00371
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel Research in Information Systems: Concepts, Strategies, Problems, and Pitfalls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(41 citation statements)
references
References 122 publications
0
40
0
Order By: Relevance
“…This paper also calls for more papers rigorously conducted at multiple levels of analysis given that there have been very few researchers conducted multi-level empirical studies, and many of them [e.g 85, 94] did not account for the effects of interdependencies between individuals [153]. To understand the dependence of BI business value on organizational structure [33], changes [13], resources allocation [69], and orchestration [154].…”
Section: What We Need To Knowmentioning
confidence: 99%
“…This paper also calls for more papers rigorously conducted at multiple levels of analysis given that there have been very few researchers conducted multi-level empirical studies, and many of them [e.g 85, 94] did not account for the effects of interdependencies between individuals [153]. To understand the dependence of BI business value on organizational structure [33], changes [13], resources allocation [69], and orchestration [154].…”
Section: What We Need To Knowmentioning
confidence: 99%
“…Despite this major focus on GSS, research has also highlighted that AST may serve as a metatheory (Bostrom, Gupta, & Thomas, 2009) for understanding other complex information systems, such as LMS (Tennant et al, 2014) or massive open online courses (MOOCs) (Whitaker, New, & Ireland, 2016) that are applied in sociotechnical systems. Though in the past usually used on a group level, AST serves as a multilevel theory (Bélanger, Cefaratti, Carte, & Markham, 2014), and researchers have applied it particularly in a TML context on an individual level to understand how individuals use IT in their learning process (Gupta & Bostrom, 2013;Hardin, Looney, & Fuller, 2014). The appropriation process is a central construct in the learning process that complements content acquisition (Gupta & Bostrom, 2013).…”
Section: Relevance Of Faithful Lms Appropriation In the Learning Processmentioning
confidence: 99%
“…In doing so, researchers could explore actual privacy violations and their consequences and factors that lead to organizational practices regarding information privacy. Furthermore, rather than considering information privacy at each unit of analysis, there is a need for research that explores the inter‐dependencies of information privacy determinants and outcomes across levels of analysis, including in dyadic relationships, group level information privacy, organizational privacy or societal information privacy (Bélanger et al, ). Contextual nature of privacy . There has been a recent call for research to investigate the contextual nature of privacy (Nissenbaum, ).…”
Section: The Future Of Information Privacy Researchmentioning
confidence: 99%