Online privacy fatigue: A sco** review and research agenda
Online users are responsible for protecting their online privacy themselves: the mantra is
custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact …
custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact …
Privacy Concerns and Data Sharing in the Internet of Things: Mixed Methods Evidence from Connected Cars.
Abstract The Internet of Things (IoT) is increasingly transforming the way we work, live, and
travel. IoT devices collect, store, analyze, and act upon a continuous stream of data as a by …
travel. IoT devices collect, store, analyze, and act upon a continuous stream of data as a by …
Methodological implications of critical realism for mixed-methods research
Building on recent developments in mixed methods, we discuss the methodological
implications of critical realism and explore how these can guide dynamic mixed-methods …
implications of critical realism and explore how these can guide dynamic mixed-methods …
Context is king! Considering particularism in research design and reporting
We aim to raise awareness of context by examining its role in empirical research. We apply
the dichotomy of universalism and particularism, and discuss the interaction of theory and …
the dichotomy of universalism and particularism, and discuss the interaction of theory and …
Sampling techniques for quantitative research
M Sarker, MA AL-Muaalemi - Principles of social research methodology, 2022 - Springer
In quantitative research, collecting data from an entire population of a study is impractical in
many instances. It squanders resources like time and money which can be minimized by …
many instances. It squanders resources like time and money which can be minimized by …
Knowledge paths in design science research
Abstract Ralph Waldo Emerson brilliantly said,“Life is a journey, not a destination.” As
researchers, we travel on paths of knowledge throughout life. The outcomes of rigorous …
researchers, we travel on paths of knowledge throughout life. The outcomes of rigorous …
[HTML][HTML] Six strategies for generalizing software engineering theories
General theories of software engineering must balance between providing full
understanding of a single case and providing partial understanding of many cases. In this …
understanding of a single case and providing partial understanding of many cases. In this …
Agile requirements prioritization in large-scale outsourced system projects: An empirical study
The application of agile practices for requirements prioritization in distributed and
outsourced projects is a relatively recent trend. Hence, not all of its facets are well …
outsourced projects is a relatively recent trend. Hence, not all of its facets are well …
Technical action research as a validation method in information systems design science
R Wieringa, A Moralı - … Conference on Design Science Research in …, 2012 - Springer
Current proposals for combining action research and design science start with a concrete
problem in an organization, then apply an artifact to improve the problem, and finally reflect …
problem in an organization, then apply an artifact to improve the problem, and finally reflect …
Behavioral intention in social networking sites ethical dilemmas: An extended model based on theory of planned behavior
The expanding use of social networking sites (SNSs) and their flexible functionalities allow
individuals to use these sites in unexpected and unethical ways. SNS users face ethical …
individuals to use these sites in unexpected and unethical ways. SNS users face ethical …