Classic Grounded Theory-The Latest Version: Interpretation of Classic Grounded Theory as a Meta-Theory for Research

2018 ◽  
Vol 41 (4) ◽  
pp. 547-564 ◽  
Author(s):  
Krzysztof T. Konecki
2021 ◽  
Author(s):  
Elżbieta Czykwin

Spektakularny casus Andersa Breivika wywołał, i wywołuje daleko idące reperkusje społeczne. W artykule analizowano dochodząc drogą Metody Ugruntowanej (Konecki K.T., 2018, Classic Grounded Theory–The Latest Version: Interpretation of Classic Grounded Theory as a Meta-Theory for Research , „Symbolic Interaction”, 41, s. 547–564), dzięki której z ogromnej ilości materiału i możliwych zmiennych, udało się „wydestylować” cztery podstawowe wymiarów jako konstytutywne i jednocześnie, jak można było stwierdzićpóźniej - wspólne dla wielu innych przypadków, które miały miejsce przed zamachem 22/7 i po nim. Wymiarami tymi są: dysfunkcjonalne relacje społeczne w dzieciństwie, narcyzm,uzależnienie od Internetu i status incela oraz doświadczanie wstydu. Wszystkie te wymiary występują wspólnie i w ekstremalnym nasileniu. Dzięki temu uzyskano rodzaj matrycy konceptualnej pozwalającej na przyjęcie swoistego approach w analizach podobnych przypadków. Matryca ta umożliwia też zrozumienie toksycznych źródeł osadzonych we współczesnej cywilizacji okcydentu.


Author(s):  
José Luís Braga ◽  
Marta Dionísio

This chapter attempts to explain the main strategies adopted by the hosts of manor houses when they engage in lodging activities. The present research draws on 53 non-structured interviews made to owners/hosts of housing tourism facilities (HT). The methodological approach used is classic grounded theory (CGT). CGT encompasses a set of strict research procedures leading to concepts which explain what is going on in the HT substantive area. Within this context, the authors reveal a theoretical code, designated as ‘amplifying casual looping', which the authors believe has the merit of effectively conceptualizing the substantive codes generated by us. This causal model broadens in both directions: positive (virtuous circle) and negative (vicious circle).


2019 ◽  
Vol 29 (1/2) ◽  
pp. 57-85 ◽  
Author(s):  
Sherry Li Xie

Purpose This paper aims to report on a study that aimed at analyzing the relationships between information security and records management (RM), both as programs/functions established in organizations. Similar studies were not found in relevant literature. Design/methodology/approach The study used the classic grounded theory methodology. Pursuing the general curiosity about the information security-RM relationship in organizations, the study selected the United States (US) Federal Government as its field of entrance and followed the process of the classic grounded theory methodology that starts from the letting of the emergence of the research question to the formulation of a substantive theory that answered the question. Findings On the emergent question that why, despite the legislative establishment of agency RM programs and the use of the term records in their work, the US Federal Government information security community considered RM a candidate for deletion (CFD), the study coded the truncated application of the encompassing definition of records as the underlying reason. By this code, along with its three properties, i.e. limitations by the seemingly more encompassing coverage of information, insufficient legislative/regulatory support and the use of the terms of evidence and preservation in the records definition, the CFD consideration and the associated phenomena of unsound legislative/regulatory conceptualization, information shadow, information ignorance and archival shadow were explained. Research limitations/implications The study results suggested the data for subsequent theoretical sampling to be the operational situations of individual agency RM programs. Practical implications The rationale presented in the study regarding the encompassing nature of records and the comprehensive scope of RM program can be used for building strong RM business cases. Originality/value The study appears to be the first of its kind, which examined the RM–information security relationship in a very detailed setting.


2016 ◽  
Vol 26 (14) ◽  
pp. 2024-2034 ◽  
Author(s):  
Andrew Hunter ◽  
John Keady ◽  
Dympna Casey ◽  
Annmarie Grealish ◽  
Kathy Murphy

The objective of this study was to develop a substantive grounded theory of staff psychosocial intervention use with residents with dementia in long-stay care. “Becoming a person again” emerged as the core category accounting for staffs’ psychosocial intervention use within long-stay care. Interview data were collected from participants in nine Irish long-stay settings: 14 residents with dementia, 19 staff nurses, one clinical facilitator, seven nurse managers, 21 nursing assistants, and five relatives. Constant comparative method guided the data collection and analysis. The researcher’s theoretical memos, based on unstructured observation, and applicable extant literature were also included as data. By identifying the mutuality of the participants’ experiences, this classic grounded theory explains staff motivation toward psychosocial intervention use within long-stay care. It also explains how institutional factors interact with those personal factors that incline individuals toward psychosocial intervention use.


Sign in / Sign up

Export Citation Format

Share Document