Key Issues in Information Systems Management Surveys: Methodological Issues and Choices in a Norwegian Context

نویسندگان

  • Petter Gottschalk
  • Bo Hjort Christensen
  • Richard T. Watson
چکیده

Information systems (IS) departments face many challenges in today’s rapidly changing environment. One approach to understanding the challenges faced by IS departments is to survey IS managers to elicit what they consider key issues. Key issues in IS management surveys have been conducted for many years in many nations and regions. However, most key issues surveys seem to lack a theoretical basis for the selection of key issues. Furthermore, most key issues surveys have used the Delphi technique in multiple rounds. Recently, the analysis of key issues in IS management has been extended by a multimethod approach using Q methodology and interpretive structural modeling. This paper presents methodological issues and choices for a planned survey on key issues in IS management in Norway in 1999. A three step procedure for key issues selection is introduced, and a multimethod approach for analysis is adapted. However, this research is at an early stage making the paper primarily serve as a basis for discussion and feedback valuable for future research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Issues in IS Management in Norway: An Empirical Study Based on Q Methodology

Information systems (IS) departments face many challenges in today’s rapidly changing environment. One approach to understanding these challenges is to survey IS managers to elicit what they consider are key issues. Studies of key IS management issues have been conducted for some years in many nations and regions. However, most of these surveys lack a theoretical basis for the selection of key ...

متن کامل

The Qualitative Descriptive Approach in International Comparative Studies: Using Online Qualitative Surveys

International comparative studies constitute a highly valuable contribution to public policy research. Analysing different policy designs offers not only a mean of knowing the phenomenon itself but also gives us insightful clues on how to improve existing practices. Although much of the work carried out in this realm relies on quantitative appraisal of the data contained in international databa...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Scandinavian J. Inf. Systems

دوره 9  شماره 

صفحات  -

تاریخ انتشار 1997