scholarly journals Book Review- Choosing Classic Grounded Theory: a Grounded Theory Reader of Expert Advice

2015 ◽  
Vol 1 (15) (4) ◽  
pp. 154-156
Author(s):  
Gary Evans
NASPA Journal ◽  
2000 ◽  
Vol 38 (1) ◽  
Author(s):  
Tracy Davis

Stanley Levy and Charles Kozoll capture much of the complexity of decisionmaking and offer an important contribution to our understanding of this perplexing topic. The publication of A Guide to Decision Making in Student Affairs: A Case Study Approach, furthermore, is timely due to what Stage (1993) recognizes as an increasing expectation that "new professionals, even at the lowest levels, have the ability to work independently and solve complex issues knowledgeably and with skill and integrity" (p. iii). The case study approach combined with the expert advice of 15 seasoned student affairs deans (called informants) provides a valuable resource for learning about a central task in our profession. The book offers students as well as experienced professionals background information critical to decisionmaking in higher education, exploration of fundamental issues that influence the process, carefully constructed and relevant case studies, and a reservoir of advice from some of the most well respected senior-level practitioners in our field. This book is particularly valuable to faculty members facilitating learning with new professionals, but it is a resource most student affairs professionals would find well worth owning.


Author(s):  
José Luís Braga ◽  
Marta Dionísio

This chapter attempts to explain the main strategies adopted by the hosts of manor houses when they engage in lodging activities. The present research draws on 53 non-structured interviews made to owners/hosts of housing tourism facilities (HT). The methodological approach used is classic grounded theory (CGT). CGT encompasses a set of strict research procedures leading to concepts which explain what is going on in the HT substantive area. Within this context, the authors reveal a theoretical code, designated as ‘amplifying casual looping', which the authors believe has the merit of effectively conceptualizing the substantive codes generated by us. This causal model broadens in both directions: positive (virtuous circle) and negative (vicious circle).


2019 ◽  
Vol 29 (1/2) ◽  
pp. 57-85 ◽  
Author(s):  
Sherry Li Xie

Purpose This paper aims to report on a study that aimed at analyzing the relationships between information security and records management (RM), both as programs/functions established in organizations. Similar studies were not found in relevant literature. Design/methodology/approach The study used the classic grounded theory methodology. Pursuing the general curiosity about the information security-RM relationship in organizations, the study selected the United States (US) Federal Government as its field of entrance and followed the process of the classic grounded theory methodology that starts from the letting of the emergence of the research question to the formulation of a substantive theory that answered the question. Findings On the emergent question that why, despite the legislative establishment of agency RM programs and the use of the term records in their work, the US Federal Government information security community considered RM a candidate for deletion (CFD), the study coded the truncated application of the encompassing definition of records as the underlying reason. By this code, along with its three properties, i.e. limitations by the seemingly more encompassing coverage of information, insufficient legislative/regulatory support and the use of the terms of evidence and preservation in the records definition, the CFD consideration and the associated phenomena of unsound legislative/regulatory conceptualization, information shadow, information ignorance and archival shadow were explained. Research limitations/implications The study results suggested the data for subsequent theoretical sampling to be the operational situations of individual agency RM programs. Practical implications The rationale presented in the study regarding the encompassing nature of records and the comprehensive scope of RM program can be used for building strong RM business cases. Originality/value The study appears to be the first of its kind, which examined the RM–information security relationship in a very detailed setting.


Sign in / Sign up

Export Citation Format

Share Document