Exploratory factor analysis revisited: How robust methods support the detection of hidden multivariate data structures in IS research
نویسندگان
چکیده
Exploratory factor analysis is commonly used in IS research to detect multivariate data structures. Frequently, the method is blindly applied without checking if the data at hand fulfill the requirements of the method. In this paper, we investigate the influence of sample size, data transformation, factor extraction method, rotation and number of factors on the outcome. We compare classical exploratory factor analysis with a robust counterpart which is less influenced by data outliers and data heterogeneities. Our analyses reveal that robust exploratory factor analysis is more stable than the classical method.
منابع مشابه
The Use of Robust Factor Analysis of Compositional Geochemical Data for the Recognition of the Target Area in Khusf 1:100000 Sheet, South Khorasan, Iran
The closed nature of geochemical data has been proven in many studies. Compositional data have special properties that mean that standard statistical methods cannot be used to analyse them. These data imply a particular geometry called Aitchison geometry in the simplex space. For analysis, the dataset must first be opened by the various transformations provided. One of the most popular of the a...
متن کاملتعیین روایی و پایایی پرسشنامه رفتار رانندگان اتوبوس شهر تهران در سال 1391: تحلیل عامل اکتشافی و تأییدی
Background and Objective: Most accidents can be directly attributed to human factors. The aim of this study is to determine the validity and reliability of drivers aberrant behavior questionnaire in urban Bus Company. Materials and Methods: This descriptive study was performed on 168 subjects (in order to exploratory factor analysis) and 161 subjects (for the sake of confirmatory f...
متن کاملInternational Academic Entrepreneurship: Measuring Indicators
Objective: This study was conducted to measure international academic entrepreneurship indicators. Method: This research is of applied type and with the help of quantitative method and using survey and correlation method. The data was collected using a questionnaire from 384 statistical samples from the community of theoretical and experimental experts in the field of academic entrepreneurship ...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملRobust SiZer for Exploration of Regression Structures and Outlier Detection
The SiZer methodology proposed by Chaudhuri & Marron (1999) is a valuable tool for conducting exploratory data analysis. In this article a robust version of SiZer is developed for the regression setting. This robust SiZer is capable of producing SiZer maps with different degrees of robustness. By inspecting such SiZer maps, either as a series of plots or in the form of a movie, the structures h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information & Management
دوره 47 شماره
صفحات -
تاریخ انتشار 2010