17 research outputs found

    Trustworthiness of Grounded Theory Methodology Research in Information Systems

    Get PDF
    Grounded Theory Methodology (GTM) is being used increasingly in the Information Systems (IS) discipline. However, some consumers of IS literature are skeptical of the findings in studies using this method. In this paper, we provide some steps that can be taken by researchers to improve the credibility of their work. This can be accomplished through increased trustworthiness of their research. The quality of quantitative research can be evaluated by examining the internal validity, external validity, reliability; similarly the trustworthiness of GTM studies can be evaluated by examining the credibility, transferability, dependability and confirmability of the study. We provide specific steps that can be taken to accomplish trustworthiness of GTM research and from IS literature; we summarize some of the GTM research that has applied these steps

    Marketspace Power Struggles: Families Confronting Spatial Limitations

    No full text
    A significant number of families encounter spatial limitations in the marketplace stemming from the disability of one of their children. Restrictions arise in many areas, such as limited mobility, difficulty engaging with the market environment or time limitations. A phenomenological approach provides family perspectives on the marketspace, how they contest spatial limitations of the market and how they attempt to reclaim their "place in the market" as they move out of the shadows of disability-invisibility. The meanings of public and private activities are explored as are culturally embedded notions of ability and disability

    Health and Consumer Vulnerability: Identity Dissolution and Resiliency Behaviors

    No full text
    Health challenges threaten consumer identity and market presence. This research explores identity dissolution and reconstitution through consumption and market engagement. Sixty interviews explore consumption meanings for individuals facing acute diagnosis, chronic illness, disability, and end-of-life. Despite experiencing vulnerability, consumers craft consumption practices that reconstruct identity, restore equity, and build resiliency

    The social model and consumers with disabilities research: contributions, criticisms, and call for new perspectives

    No full text
    International audienceSince the 1990s, the marketing literature has seen the emergence of research dedicated to consumers with disabilities (CWD). This work is mostly based on the social model of disability, which encourages practitioners to eradicate the physical and architectural barriers faced by individuals. However, in the field of disability studies, the social model is increasingly criticised both for being too radical and for neglecting the subjective experience of disability. In this paper, we attempt to illuminate existing views, while advocating new perspectives, for conceptualising and representing disability in consumer research. With this in mind, we first briefly present the major conceptual foundations and models of disability research. Then, we systematically review marketing literature on CWD to examine the perspectives used when studying this phenomenon. Finally, we propose a research agenda aimed at advancing the understanding of consumption and disability

    A Theory of Employee Compliance with Information Security

    Get PDF
    User non-compliance with information security policies in organizations due to negligence or ignorance is reported as a key data security problem for organizations. Research on employee violation of information security policies has focused on non-compliance due to poor training, low employee motivation, weak effective commitment, or individual oversight. However, the findings from some of the studies are contradictory. Furthermore, no parsimonious theory explains nor predicts employee compliance with information security policies. This study addresses this problem by building a theoretical model grounded in data using grounded theory methodology. The findings indicate organizations need to create a supportive organizational environment. These measures will impact individual employee’s perception. Information technology plays a moderating role between organization practices and the individual cognitive factors. These cognitive factors will in turn have an effect on the individual employees’ compliance with the information security policies

    Youth and Risky Consumption: Moving Toward a Transformative Approach

    Get PDF
    Recent statistics indicate that youth continue to engage in a wide variety of risky behaviours in spite of significant investment devoted to improving their well-being. One possible factor is a paternalistic view in understanding risk and promoting well-being. Participants in the Youth and Risk track of the Transformative Consumer Research conference challenge the paternalistic view, arguing in this paper for a more inclusive perspective that requires a re-examination of the nature of risk. The paternalistic view is discussed, and then countered with a more participatory approach that develops a role for youth in research in order to achieve socially desirable outcomes

    The Business Case for CSR

    No full text
    https://www.ama.org/events-training/Conferences/Documents/2015-AMA-Marketing-Public-Policy-Proceedings.pdfCorporate social responsibility (CSR) policies can be reconceived strategically to confer competitive advantage as implied by the proponents of the “shared value” notion. A qualitative research involved in-depth, semi structured interview questions that explored eco-certified accommodation establishments’ ethos for responsible behaviors. The findings have indicated that discretionary spending in socially and environmentally-sound initiatives have led to improved stakeholder relationships, effective human resources management, better market standing, operational efficiencies and cost savings, along with other benefits.peer-reviewe

    Advancing a participatory approach for youth risk behavior:foundations, distinctions, and research

    No full text
    Researchers of youth risk behavior frequently assume that behavior is volitional; the choice is to either engage in a risky behavior or a safe alternative. Yet, many factors may constrain life choices, not the least of which is how individuals view risk. The study here examines youth risk research to identify general knowledge gaps and shortcomings that may be limiting the positive impact of research-based efforts to promote youth well-being. The study proposes alternative approaches that address these gaps and shortcomings in particular with recognition of the social contexts of both risks and the programs designed to address those risks. A distinctive foundation for a participatory approach to understanding youth risk behavior is then developed
    corecore