{"id":356,"date":"2019-05-18T19:37:44","date_gmt":"2019-05-18T19:37:44","guid":{"rendered":"http:\/\/marcschmalz.com\/blog\/?p=356"},"modified":"2019-05-18T19:37:44","modified_gmt":"2019-05-18T19:37:44","slug":"notes-on-lit-reviews","status":"publish","type":"post","link":"http:\/\/marcschmalz.com\/blog\/notes-on-lit-reviews\/","title":{"rendered":"Notes on Lit Reviews"},"content":{"rendered":"<h3><span style=\"font-weight: 400;\">Papers Covered<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Alavi, M., &amp; Leidner, D. E. (2001). Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues. <\/span><i><span style=\"font-weight: 400;\">MIS Quarterly<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">25<\/span><\/i><span style=\"font-weight: 400;\">(1), 107.<\/span><a href=\"https:\/\/doi.org\/10.2307\/3250961\"> <span style=\"font-weight: 400;\">https:\/\/doi.org\/10.2307\/3250961<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">B\u00e9langer, &amp; Crossler. (2011). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. <\/span><i><span style=\"font-weight: 400;\">MIS Quarterly<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">35<\/span><\/i><span style=\"font-weight: 400;\">(4), 1017.<\/span><a href=\"https:\/\/doi.org\/10.2307\/41409971\"> <span style=\"font-weight: 400;\">https:\/\/doi.org\/10.2307\/41409971<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Jones, M. R., &amp; Karsten, H. (2008). Giddens\u2019s Structuration Theory and Information Systems Research. <\/span><i><span style=\"font-weight: 400;\">MIS Quarterly<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">32<\/span><\/i><span style=\"font-weight: 400;\">(1), 127\u2013157.<\/span><a href=\"https:\/\/doi.org\/10.2307\/25148831\"> <span style=\"font-weight: 400;\">https:\/\/doi.org\/10.2307\/25148831<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Roberts, Galluch, Dinger, &amp; Grover. (2012). Absorptive Capacity and Information Systems Research: Review, Synthesis, and Directions for Future Research. <\/span><i><span style=\"font-weight: 400;\">MIS Quarterly<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">36<\/span><\/i><span style=\"font-weight: 400;\">(2), 625.<\/span><a href=\"https:\/\/doi.org\/10.2307\/41703470\"> <span style=\"font-weight: 400;\">https:\/\/doi.org\/10.2307\/41703470<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Wade, M., &amp; Hulland, J. (2004). Review: The Resource-Based View and Information Systems Research: Review, Extension, and Suggestions for Future Research. <\/span><i><span style=\"font-weight: 400;\">MIS Quarterly<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">28<\/span><\/i><span style=\"font-weight: 400;\">(1), 107\u2013142.<\/span><a href=\"https:\/\/doi.org\/10.2307\/25148626\"> <span style=\"font-weight: 400;\">https:\/\/doi.org\/10.2307\/25148626<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Wiener, M., M\u00e4hring, M., Remus, U., &amp; Saunders, C. (2016). Control Configuration and Control Enactment in Information Systems Projects: Review and Expanded Theoretical Framework. <\/span><i><span style=\"font-weight: 400;\">MIS Quarterly<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">40<\/span><\/i><span style=\"font-weight: 400;\">(3), 741\u2013774.<\/span><a href=\"https:\/\/doi.org\/10.25300\/MISQ\/2016\/40.3.11\"> <span style=\"font-weight: 400;\">https:\/\/doi.org\/10.25300\/MISQ\/2016\/40.3.11<\/span><\/a><\/p>\n<h3>Notes<\/h3>\n<p><span style=\"font-weight: 400;\">My advisor recommended a set of literature review articles to review in order to help formulate my own lit review of material for my proposal. I had the idea of trying to write the problem domain lit review of my proposal as a separate lit review paper, so these papers are a way to show me what\u2019s ahead.<\/span><\/p>\n<p><b>Alavi and Leidner (2001)<\/b><span style=\"font-weight: 400;\"> deal with knowledge management, but kick off a section that is an overview and provides a short review of scholarship on the nature of knowledge. Salient to my work is their discussion of taxonomies of knowledge, since I\u2019m interested in classification systems within my problem domain. Unfortunately, key terms aren\u2019t necessarily apparent when first encountered. Italicizing first instances would help. The high-level outline looks like this:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Introduction<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Knowledge and the Firm: An Overview and Basic Concepts<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Organizational Knowledge Management Processes: A Framework for Analysis of the Role of an Information System<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Research Issues in Knowledge Management<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Summary and Conclusions <\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This feels like a book chapter on the topic. I don\u2019t know what the difference should be between a book article on a topic and a lit review of the topic. Perhaps this is the difference: It lacks a method section, where the systematic consumption and analysis of literature on the topic is detailed; Instead, it feels like established experts making their personal tacit understanding of knowledge management more explicit. (Which is not criticism. They obviously have a great deal of knowledge on this topic.) <\/span><\/p>\n<p><b>Wade and Hulland (2004)<\/b><span style=\"font-weight: 400;\"> start with a description of their specific topic (resource-based view of the firm) which includes a summary of expected benefits to the broader field. The appendix includes a list of 24 studies published over 12 years that were analyzed for the review. Part of this review that seemed promising was a section on typologies for IS resources, which would be pertinent to my interest in risk classification. Unfortunately, the author isn\u2019t reviewing multiple typologies, but picks one and uses it to classify \u201cinformation systems resources from previous studies\u201d (p 112). The paper does build well, each section building on the previous. <\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Introduction<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The Resource-Based View of the Firm<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">IS Resources and the Resource-Based View<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Potential Moderators<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Using the RBV in IS Research<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Summary and Conclusions<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The authors spend about 3.5 pages on suggestions for research. Editing issue: Potential Moderators has a sub-section called Potential Moderators. Beginning in section 3, the authors start sharing propositions in order to suggest future study. Each proposition (there are 8 main propositions, several with sub-propositions, making the total 14) is stated like a hypothesis, but left untested.<\/span><\/p>\n<p><b>Jones and Karsten (2008)<\/b><span style=\"font-weight: 400;\"> have the benefit of a single originating source for the theoretical framework under review&#8211;Gidden&#8211;so the paper begins with an overview of his oeuvre, moves to a summary of this particular theoretical framework, and then to others\u2019 work with it. They \u201cidentify 331 Information Systems articles published between 1983 and 2004 that have drawn on Giddens\u2019s work and analyze their use of structuration theory\u201d (p. 127). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cFour main methods were used to carry out this search: the first was to consult previous review articles; second was an online search of ABI\/Inform and EBSCO Business Periodicals using the search terms Giddens AND Information*; third was a manual review of hard copies of a number of significant IS journals; and finally, an analysis of the proceedings of International Federation for Information Processing&#8217;s Working Group 8.2 (Interaction of lnformation Systems and the Organization) and the International Conference on Information Systems. Further references were also sought, for example, through analysis of bibliographies of the articles themselves\u201d (p. 134).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is the first paper so far to explicitly detail their methods for search, filtering, and analysis of a large body of knowledge. This boils down to two online searches, a manual review of certain journals and conference proceedings, and citation crawls.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Introduction<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Structuration Theory in the Context of Gidden\u2019s Work<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Structuration Theory<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Analyzing the Use of Structuration Theory in the IS Field<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">An Agenda for Structurational IS Research<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Summary<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Conclusions<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Section 3 references Table 2, which has key three columns: Feature of Structuration Theory, Implications, and Potential Issues. Unfortunately, there are no citations in this table, and pointers to potential explanations in the text don\u2019t exist: The reader must continuously scan the document to find where concepts were introduced. The in-text reference to Table 2 comes after many pages of material that are being summarized.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Section 5 contains the research agenda, which is summarized in a table. Rather than list propositions, the table is split into Area and Research Opportunity columns. Areas are perceived shortcomings in the current literature, and Research Opportunities are broad suggestions for studies (far less specific, it seems to me, than Jones and Karsten\u2019s propositions). <\/span><\/p>\n<p><b>Wiener et al. (2016)<\/b><span style=\"font-weight: 400;\"> has several good structural features that I might replicate: They specifically limit their work and they detail their methods. The full high-level outline: <\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Introduction<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Foundations and Boundaries<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Research Methodology<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Literature Review and Synthesis<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Contributions of the Expanded Theoretical Framework<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Conclusions<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This is the first paper to strictly say what it isn\u2019t. With the others, the bounds have all been implied. This point should be important in my own work, since I\u2019m currently struggling with defining my own constraints. The work \u201cfocuses on a distinct unit of analysis: the collection of control activities carried out in relation to an IS project\u201d (p. 5).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The methods section references a paper I already have (Leidner and Kayworth (2006)) so I\u2019ll be returning to that for a review. They start with a manual review of the Basket of Eight AIS journals, continued with multiple online searches of relevant journals, and performed citation crawls of articles that cited key papers they\u2019d identified. They again talk about boundaries:<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">Given the volume of the control literature, we chose to limit our review sample to empirical studies and key conceptual studies where both IS and project control were significant themes. Furthermore, we excluded from our sample conference papers that resulted in journal articles, publications with no original content such as announcements or forewords, and research-in-progress papers. With this preselection strategy we aimed at including all relevant studies with substantial contributions while avoiding an unmanageable sample and studies of limited value (Leidner and Kayworth 2006). To avoid selection errors, we read the abstract, introduction, discussion, and conclusion section of each identified study (Swanson and Ramiller 1993). Following this approach, we selected 57 studies for inclusion in our analysis (p. 6). <\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Literature Review and Synthesis is the bulk of the paper, something like 18 pages. While they\u2019ve analyzed 57 articles, they actually have fewer authors. Kirsch appears six times as lead author, more than 10% of the sources. I have the feeling this sort of cluster of influence should be called out. Details aren\u2019t available on how they produced their framework of themes during synthesis. One of their themes only includes seven of the fifty-seven articles (about 12%). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rather than propositions, the authors share conjectures. I\u2019m now thoroughly confused at the relationships among conjectures, propositions, and hypotheses. The article includes 8 conjecture statements, two with sub-conjectures. Each points at a gap or inconsistency in the literature, summarized in Table 9 (p. 26).<\/span><\/p>\n<p><b>Roberts, Galluch, Dinger, &amp; Grover (2012)<\/b><span style=\"font-weight: 400;\"> also have a details of how they conducted their search. The authors pick a \u201cseminal\u201d article as the focus and look for works referring to that origin article for part one of their lit search. With similar crawls for other important articles and an AIS journal set search, the result was 98 articles used for the analysis. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The authors claim two objectives. \u201c[Our] first objective will be to demonstrate the application of absorptive capacity and how it interacts with a variety of IS theoretical perspectives and phenomena\u201d (p. 626). \u00a0\u201cOur second objective is to better guide the use of absorptive capacity in IS research\u201d (p. 626).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The outline:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Introduction<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What is Absorptive Capacity?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Absorptive Capacity in IS Research<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A Framework for Investigating the Interaction of Information Technology and Absorptive Capacity<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Conclusion<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Part 3 is broken down into three sections: Conceptualization, Levels of Analysis, and Measurement Domain. (Despite this clear division in the introduction of the section, the headers don\u2019t seem to reflect this structure, which can cause confusion when trying to scan the paper.) In Conceptualization, the authors discuss the ways in which articles \u201cunderstood the original theoretical context\u201d (p. 631) and summarize that information in table form. For my own work, I\u2019m trying to decide when to use these sorts of differences to filter out articles (bound my research) and when it\u2019d be better to make it part of the analysis. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Objective two is carried out using thematic analysis of the reviewed documents. It \u201csystematically categorizes content of text and identifies relationships among the categories [and] is valuable for making sense of a large domain of research, and it can guide future research\u201d again citing Leidner &amp; Kayworth (2006). The results of the analysis are summarized as a Venn diagram and detailed in text. That section is followed by details on limitations to the field of research. The framework makes suggestions for addressing and overcoming these limitations. \u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m trying to make the lit review of my problem domain for my dissertation proposal good enough that I can get it published as a stand-alone lit review. One of my advisors suggested a set of papers to read through to get a better idea of how to write good lit reviews. <a class=\"more-link\" href=\"http:\/\/marcschmalz.com\/blog\/notes-on-lit-reviews\/\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-356","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/posts\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":1,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/posts\/356\/revisions"}],"predecessor-version":[{"id":357,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/posts\/356\/revisions\/357"}],"wp:attachment":[{"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/media?parent=356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/categories?post=356"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/marcschmalz.com\/blog\/wp-json\/wp\/v2\/tags?post=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}