TABLE 1 - uploaded by Pertti Järvinen
Content may be subject to copyright.
DIFFERENT TYPES OF CASE STUDIES (PARTIAL DESCRIPTION) [23]

DIFFERENT TYPES OF CASE STUDIES (PARTIAL DESCRIPTION) [23]

Source publication
Article
Full-text available
Research objects and research outcomes are proposed to act as a guide to select a proper research method. We, however, recommend that the research question as the essential factor of the research process should guide selection. Based on this idea we here develop taxonomy of research approaches with six categories. Taxonomy is then compared with thr...

Context in source publication

Context 1
... would like to return to the case study, because Cunningham [23] shows that there are at least 9 different case study types (TABLE 1). From the table above we can make some remarks. ...

Similar publications

Article
Full-text available
The taxonomy of agricultural holdings’ land use structure of the CEEC countries that are the EU members aims to investigate the diversity of this phenomenon and its evolution in 2005-2010. In order to establish homogenous clusters of land use, a structural taxonomy technique called the vectors elimination method was employed. The research outcome w...

Citations

... In these cases, the operating definition of a useful taxonomy is whether it can be used to classify a known set of data. Other means to evaluate usefulness were to express usefulness through another set of quality attributes (Aksulu & Wade, 2010;Botha et al., 2018;Diniz et al., 2019;Gibbs et al., 2016;Oberländer et al., 2018;Schneider et al., 2014;Snow & Reck, 2016;Thiebes et al., 2017), use of expert opinion (Herzfeldt et al., 2012;Raza et al., 2018;Schäffer & Stelzer, 2017), for example collected through interviews, and comparisons with other taxonomies (Jarvinen, 2000). Some definitions were tautological, that is a taxonomy is useful if it is used (Geiger et al., 2012;Snow & Reck, 2016). ...
... A majority defined conciseness (Bärenfänger et al., 2016;Botha et al., 2018;Diniz et al., 2019;Nickerson et al., 2013;Püschel et al., 2016;Schäffer & Stelzer, 2017;Schneider et al., 2014;Seyffarth et al., 2017;Siering et al., 2017;Snow & Reck, 2016;Stöckli et al., 2017;Strode, 2016;Tönnissen & Teuteberg, 2018;Werder & Wang, 2016) or simplicity (Prat et al., 2015) through the taxonomy's number of dimensions and characteristics. Parsimoniousness in the number of dimensions (Jarvinen, 2000) or categories (Aksulu & Wade, 2010) was also used to define conciseness. ...
Article
Full-text available
Introduction Taxonomies capture knowledge about a particular domain in a succinct manner and establish a common understanding among peers. Researchers use taxonomies to convey information about a particular knowledge area or to support automation tasks, and practitioners use them to enable communication beyond organizational boundaries. Aims Even though this important role of taxonomies in software engineering, their quality is seldom evaluated. Our aim is to identify and define taxonomy quality attributes that provide practical measurements, helping researchers and practitioners to compare taxonomies and choose the one most adequate for the task at hand. Methods We reviewed 324 publications from software engineering and information systems research and synthesized, when provided, the definitions of quality attributes and measurements. We evaluated the usefulness of the measurements on six taxonomies from three domains. Results We propose the definition of seven quality attributes and suggest internal and external measurements that can be used to assess a taxonomy's quality. For two measurements we provide implementations in Python. We found the measurements useful for deciding which taxonomy is best suited for a particular purpose. Conclusion While there exist several guidelines for creating taxonomies, there is a lack of actionable criteria to compare taxonomies. In this article, we fill this gap by synthesizing from a wealth of literature seven, non‐overlapping taxonomy quality attributes and corresponding measurements. Future work encompasses their further evaluation of usefulness and empirical validation.
... Jarvinen [17] presents a taxonomy of six research categories. Criteria classify similar ility research into mathematical and theory-creating categories. ...
... Theory-creating approaches identify a framework or model to describe an observation gathered and the study of what reality is, linked with grounded theory and intensive case studies. A small intensive case study is described in [17] , resembling the explanation of the Yin method [14] . ...
... Easton [18] focused on critical realism in case-study research, described the critical realist approach as a form of ontology, and developed a general application to case research. Easton [18] agreed with Javinen [17] that research questions should inform theory. Although, Easton [18] references Yin [14] when claiming that the development of questions should follow the explanation of a case study. ...
Article
Full-text available
The research outlines the design for an ‘ilities tool’ to assist small satellite verification. Prior literature commonly requests for ilities to be built-in to small satellite systems to prevent failure. Test standards are reviewed to define critical ilities. Definitions are then used to develop calculations that system designers can automate with a software tool. Previous failure data are used to predict the reliability of a future small satellite system. Bayesian estimation is applied to a qualitative NASA database of 219 small satellite (0.001–180 kg) failures from 2000 to 2016 to generate eight failure categories. A communication system (47%) or the attitude control (16%) failure are most likely to occur. A failure in the communication system has a low chance of survivability (16%). A failure within the attitude control system is expected to end with partial mission success (54%). The research suggests that an ilities tool can contribute to dynamically aiding verification. Such a tool will complement small satellite verification methods currently described by testing standards.
... We validate the effectiveness of the identified trust signals based on a between-groups experiment, an acknowledged research method for IS research (Jenkins, 1985). Experiments aim to determine the relationship among variables and subjects by manipulation and controls (Palvia et al., 2004) and are especially suitable for user-systems interface studies as experiments allow to test hypotheses on the utility of an artifact (Jarvinen, 2000;Jenkins, 1985). ...
Article
Information systems research emphasizes that blockchain requires trust in the technology itself. However, we lack knowledge on the applicability of established trust cues to blockchain technology. Thus, this paper’s objec-tive is to empirically evaluate the effectiveness of several established IS trust formation factors on end user trust. We do so by conducting a between-groups experiment. While we can validate the applicability of previous IS trust research for blockchain technology to some extent, we find that trust signals emphasizing the technolo-gy’s underlying trust-building characteristics are most effective. Hence, we highlight the need for contextualiza-tion of trust research on blockchain technology. We provide both researchers and practitioners with insights for building trustworthy blockchain applications that enable trust-less interactions not only in theory but in practice. Link to article: http://www.nils-urbach.de/uploads/1/2/9/2/12921897/manuscript_trusting_the_trust_machine.pdf
... This study is based on a conceptual-analytical approach is followed (Järvinen, 2004a(Järvinen, , 2004b. Producing secure software by introducing security engineering processes and activities to an iterative and incremental software engineering process is challenging. ...
... Naturally, this study has certain limitations which should be noted. Firstly, the paper is based on a conceptual-analytic approach (Järvinen, 2004b) and, therefore, the selection of analyzed concepts are crucial. To tackle this threat, we have selected the most widely used agile and SSE practices as the starting point for the work. ...
Chapter
Security objectives in software development are increasingly convergent with the business objectives, as requirements for privacy and the cost of security incidents call for more dependable software products. The development of secure software is accomplished by augmenting the software development process with specific security engineering activities. Security engineering, in contrast to the iterative and incremental software development processes, is characterized by sequential life cycle models: the security objectives are thus to be achieved by conflicting approaches. In this study, to identify the incompatibilities between the approaches, the security engineering activities from Microsoft SDL, the ISO Common Criteria and OWASP SAMM security engineering models are mapped into common agile software development processes, practices and artifacts.
... To answer the presented question, we collect the data of how the term has been used from Scopus and present a conceptualanalytical analysis [5] on the term. The rest of this paper is structured in following way. ...
... To analyze whether the 'ecosystem' has become a zombie category, we follow the conceptual-analytical approach [5]. We use Scopus as our main instrument for assessing the term. ...
Conference Paper
Full-text available
What do you imagine in your mind when hearing the term ‘business ecosystem’? Is the image the same as your colleague’s vision or how it was used in the latest ecosystem paper you have read? In this paper, Ulrich Beck’s theory of a zombie category is used as an instrument to raise the question whether the general concept of an ‘ecosystem’ is already a zombie category term—a term which has already dead and empty in content, while still being alive and used. ‘Business ecosystem’ and its derivatives such as the ‘software ecosystem’ are terms which do have a proper description; however, due to the widely use in different context, the terms might already be losing their original meaning. This paper reviews 20 highly-cited non-ecological ecosystem papers published after 2010. The papers represent the disciplines of engineering, social science and computer science. Five different usage cases are observed: (i) Sustainable use, (ii) Use as a synonym, (iii) Conflicting use, (iv) Use as a colloquial term, and (v) No actual use. The results implicate that term ‘ecosystem’ might be under a zombie categorization process. Its implications and countermeasures are discussed in the paper.
... In this phase, all duplicates are removed. In this study, we use conceptual-analytical approach [29]. That is, the articles are read through and summarized. ...
Conference Paper
Full-text available
The software architecture plan describes the high-level structure and logic of a software system. The architectural plan acts as a constitution and dictates the fundamental principles of the system; therefore, the plan also eventually determines which kinds of business models the software system can support. In the modern mercury business, there is need for experimentation in business model and flexibility in architecture. This paper uses a systematic literature review method to collect primary studies from the extant literature addressing business models and software architectures. The aim is to summarize the current knowledge. The selected primary studies (n=10) are qualitatively analyses and synthesized. The results show that the area remain mostly unaddressed and there is need to develop new methods to support flexible architecture design, tools and development methods.
... In this paper, we follow the conceptual-analytical research approach as defined in Järvinen's classification [39]. According to Järvinen [14], the conceptual-analytical approach can be characterized with two main subapproaches. ...
Conference Paper
Full-text available
This conceptual-analytical paper presents and defines the concept of ‘human resource debt’ (i.e., HR debt). The presented concept draws from the software engineering field’s recent work in the technical debt management, yet it departures from the existing conceptualizations by focusing on skills and competences of individual employees as well as emphasizing the need to manage the skill pool with conscious decisions. As with its paragons, this novel concept aims to help to understand, control and utilize better the phenomenon by using a simple metaphor. In addition, the metaphor, borrowed from the economics, also emphasizes the potential price that has to be paid back later. In the discussion, the ever-changing software industry is used as an example industrial domain; however, the concept should be generalizable to other fields. Finally, the paper lays foundations for future work and proposes initial actions needed for forming a proper research agenda.
... Hence, the researchers have adopted an anti-positivistic approach reflected in the use of idiographic research methods [10] in an interpretivist [11] manner. More specifically, the research method used has employed a combination of theory testing (confirming that the problems do exist and are indeed prevalent) and theory creation (revealing the mechanisms causing the problem and proposing a potential solution) [12]. ...
Conference Paper
Full-text available
The need for business agility in order to cope with the increasing rate of changes brought by disruptive technologies and paradigms is more stringent than ever; unfortunately however, it also encounters many hurdles. To start with, typical strategic transformation planning featuring successive specify-design-implement phases is no longer suitable, as the resulting sequentially staged processes can no longer catch up with the changes in internal structure and external environment. The blurring of top organisational role boundaries in regards to the allocation of management and architecture skillsets is another issue significantly affecting agility. Finally, the lack of structure and integration of business transformation and architecting methodologies offered by various disciplines and vendors affects the ability to use them for specific endeavours. This paper elaborates on and illustrates the above-mentioned problems through a case study and proposes a way to solve them in a holistic, lifecycle-aware manner using a ‘lightweight’ architectural framework approach.
... In terms of Järvinen's classification [12], the research method belongs to theory creation, employing conceptual development as part of the constructive type of research methodology [13]) in the attempt to a) reveal the root causes of the problems in the effective use of data for effective decision-making and b) to hypothesize on the traits of potential solutions. Owing to the research domain, namely decision making by management with possible automated assistance (agents), the research adopts an anti-positivistic epistemological stance [14,15] aware of the components, sources and limits of knowledge and of the justification of knowledge [16], so as to give a reliable qualitative answer to the research questions [17]. ...
Conference Paper
Full-text available
Technical advances in Information and Communication Technology have enabled the collection and storage of large amounts of data, rising hopes of digitalising and thus potentially improving decision making and related support systems. Unfortunately however, the pre-existing gap between required decision making knowledge and the useful information provided by current technologies appears to increase rather than contract. Thus, the multitude of patterns presently provided by current data analytics techniques do not deliver an adequate set of scenarios to enable effective decision making by humans. This paper advocates a digital decision analytics solution featuring the use of Situated Logic to create 'narratives' describing the meaning of data analytics results and the use of Channel Theory in order to support adequate situational awareness. This approach is explained in the context of a System-of-Systems paradigm highly relevant to today's typically complex clusters of distributed collaborative decision making centres and their associated decision support systems.
... The research methodology based on the development of systems, according to Nunamaker et al. [7], cited by Järvinen [8], fits comfortably in the category of applied science, belonging to the formulative research type in engineering development. This methodology was considered both general and fulcral, representing a super-methodology containing sub-methodologies. ...
... In this context, the research question is: Do the observations confirm the theory or not? In the process of creating new parameters and indicators, such as an efficiency indicator, characterized from field experimentation results, an approach of creation or expansion of the theory is adopted, according to Järvinen's research methodology [4,8]. Here the research question takes the following formulation: What kind of construct or model would explain the observations made? ...
Conference Paper
Framing research within a methodology supports the planning which guides the research process. The process design defines a plan where research strategies aim collection of data and respective methods of analysis, in order to provide answers to research questions. This paper describes the research process conducted in the experimental and design work conducive to the doctoral dissertation by Lourenço [1] focusing on the development and ergonomic analysis of new PC mice. This research was framed within positivism, associated to exact sciences, adopting a structured research methodology, enabling enhanced replicability. The aim of this paper is report on research methodology, in particular in what concerns the intertwined research methodologies and associated research questions involved in the development and ergonomic evaluation of PC mice. The taxonomy of research approaches proposed by Järvinen [2] is the basis for the classification of the research methodology presented.