{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T17:40:13Z","timestamp":1728150013065},"reference-count":67,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Technology"],"published-print":{"date-parts":[[2011,3]]},"abstract":" Recent information systems research calls for interaction between the researcher and the informants in interpretive case study research. In line with Van de Ven's call for engaged scholarship, we Investigate how to involve the informants in case studies, not only for the collection of facts, but also in the co-construction and interpretation of the case narrative. The paper builds on a longitudinal case study, in which we explored an approach of extensive informant involvement. Using the ladder of analytical abstraction as our analytical tool, we discuss how an extended involvement of informants may enrich the Interpretive process In case study research, and increase the relevance of the findings. We discuss how and under what conditions this form of involvement may take place, and potential challenges of this approach. <\/jats:p>","DOI":"10.1057\/jit.2010.15","type":"journal-article","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T10:05:00Z","timestamp":1282644300000},"page":"32-45","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":24,"title":["Exploring the Role of Informants in Interpretive Case Study Research in IS"],"prefix":"10.1177","volume":"26","author":[{"given":"Bendik","family":"Bygstad","sequence":"first","affiliation":[{"name":"Norwegian School of IT, Oslo, Norway;"}]},{"given":"Bj\u00f8rn Erik","family":"Munkvold","sequence":"additional","affiliation":[{"name":"University of Agder, Kristiansand, Norway"}]}],"member":"179","published-online":{"date-parts":[[2011,3,1]]},"reference":[{"first-page":"141","volume-title":"ICT Innovation: Economic and organizational perspectives","year":"2002","author":"Avgerou C.","key":"bibr1-jit.2010.15"},{"issue":"2","key":"bibr2-jit.2010.15","first-page":"5","volume":"8","author":"Baskerville R.","year":"1996","journal-title":"Scandinavian Journal of Information Systems"},{"key":"bibr3-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"bibr4-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/249403"},{"key":"bibr5-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/30036527"},{"key":"bibr6-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1177\/003803857801200307"},{"first-page":"383","volume-title":"Contemporary Field Research: Perspectives and formulations","year":"2001","author":"Bloor M.","key":"bibr7-jit.2010.15"},{"volume-title":"Symbolic Interactionism: Perspective and Method.","year":"1969","author":"Blumer H.","key":"bibr8-jit.2010.15"},{"first-page":"181","volume-title":"Research Methods in Information Systems","year":"1985","author":"Boland R.","key":"bibr9-jit.2010.15"},{"key":"bibr10-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.4324\/9780203410028"},{"key":"bibr11-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1177\/026839629801300407"},{"key":"bibr12-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.4018\/jthi.2006100101"},{"key":"bibr13-jit.2010.15","unstructured":"BygstadB., and NielsenP. A. (2003). The Meeting of Processes, Proceedings of IRIS 26 (Helsinki, Finland)."},{"key":"bibr14-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00280.x"},{"key":"bibr15-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1086\/221565"},{"volume-title":"Collaborative Inquiry Methodology","year":"1990","author":"Carney T.F.","key":"bibr16-jit.2010.15"},{"key":"bibr17-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.4135\/9781849209502"},{"key":"bibr18-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1177\/026839629801300408"},{"key":"bibr19-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/30036550"},{"volume-title":"Linking Data. Qualitative Research Methods Series No 4","year":"1986","author":"Fielding N.G.","key":"bibr20-jit.2010.15"},{"key":"bibr21-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1177\/026839629801300409"},{"key":"bibr22-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(90)90035-G"},{"volume-title":"Fourth Generation Evaluation","year":"1989","author":"Guba E.G.","key":"bibr23-jit.2010.15"},{"issue":"4","key":"bibr24-jit.2010.15","first-page":"183","volume":"7","author":"Hanseth O.","year":"1996","journal-title":"Accounting, Management and Information Systems"},{"key":"bibr25-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1177\/1476127004042845"},{"volume-title":"The Unified Software Development Process","year":"1999","author":"Jacobson I.","key":"bibr26-jit.2010.15"},{"key":"bibr27-jit.2010.15","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1093\/oso\/9780199253562.003.0009","volume-title":"The Social Study of Information and Communication Technology","author":"Kallinikos J.","year":"2004"},{"key":"bibr28-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/249410"},{"volume-title":"InterViews","year":"1996","author":"Kvale S.","key":"bibr29-jit.2010.15"},{"first-page":"299","volume-title":"The Qualitative Inquiry Reader","year":"2002","author":"Kvale S.","key":"bibr30-jit.2010.15"},{"first-page":"285","volume-title":"The Reflective Turn: Case studies in and on educational practice","year":"1991","author":"Lanzara G.F.","key":"bibr31-jit.2010.15"},{"volume-title":"Science in Action: How to follow scientists and engineers through society","year":"1987","author":"Latour B.","key":"bibr32-jit.2010.15"},{"key":"bibr33-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/248698"},{"key":"bibr34-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1993.11518000"},{"first-page":"219","volume-title":"Turning Points in Qualitative Research: Tying knots in a handkerchief","year":"2003","author":"Lincoln Y.S.","key":"bibr35-jit.2010.15"},{"key":"bibr36-jit.2010.15","unstructured":"LockeK.D., and VelamuriS.R. (2004). Member Checking Challenges, Working paper, Williamsburg, VA, The College of William and Mary."},{"key":"bibr37-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/25148648"},{"volume-title":"Improving Software Organisations","year":"2001","author":"Mathiassen L.","key":"bibr38-jit.2010.15"},{"key":"bibr39-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2648.2000.01487.x"},{"volume-title":"Qualitative Data Analysis","year":"1994","author":"Miles M.B.","key":"bibr40-jit.2010.15"},{"key":"bibr41-jit.2010.15","unstructured":"MoodyD. L. (2000). Building Links Between IS Research and Professional Practice: Improving the relevance and impact of IS research, in W.J. Orlikowski, P. Weil, S. Ang and H.C. Krcmar (eds.) Proceedings of the Twenty-First International Conference on Information Systems (Brisbane), 351\u2013360."},{"key":"bibr42-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1177\/160940690200100202"},{"key":"bibr43-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/249422"},{"key":"bibr44-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2006.11.001"},{"key":"bibr45-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-8022(98)00003-4"},{"key":"bibr46-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2004.05.001"},{"key":"bibr47-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35309-8_27"},{"first-page":"196","volume-title":"Information Systems Innovation and Diffusion","year":"1998","author":"Paulk M. C.","key":"bibr48-jit.2010.15"},{"first-page":"53","volume-title":"Research Methods in Information Systems","year":"1985","author":"Pettigrew A.M.","key":"bibr49-jit.2010.15"},{"key":"bibr50-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1.3.267"},{"first-page":"239","volume-title":"Human Inquiry","year":"1981","author":"Reason P.","key":"bibr51-jit.2010.15"},{"key":"bibr52-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/25148826"},{"key":"bibr53-jit.2010.15","first-page":"4","volume":"11","author":"Saunders C.","year":"1998","journal-title":"Information Resources Management Journal"},{"key":"bibr54-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.4135\/9781446218730"},{"volume-title":"Field Research. Strategies for a Natural Sociology","year":"1973","author":"Schatzman L.","key":"bibr55-jit.2010.15"},{"volume-title":"The Reflective Practitioner","year":"1983","author":"Sch\u00f6n D.A.","key":"bibr56-jit.2010.15"},{"volume-title":"Qualitative Methodology & Sociology","year":"1985","author":"Silverman D.","key":"bibr57-jit.2010.15"},{"volume-title":"Interpreting Qualitative Data: Methods for analysing talk, text and interaction","year":"1993","author":"Silverman D.","key":"bibr58-jit.2010.15"},{"key":"bibr59-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2005.10.003"},{"key":"bibr60-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780199226290.001.0001"},{"key":"bibr61-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35634-1_20"},{"volume-title":"Interpreting Information Systems in Organizations","year":"1993","author":"Walsham G.","key":"bibr62-jit.2010.15"},{"key":"bibr63-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1995.9"},{"key":"bibr64-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000589"},{"key":"bibr65-jit.2010.15","doi-asserted-by":"publisher","DOI":"10.2307\/249409"},{"volume-title":"Sensemaking in Organizations","year":"1995","author":"Weick K.","key":"bibr66-jit.2010.15"},{"volume-title":"Case Study Research","year":"1994","author":"Yin R.K.","key":"bibr67-jit.2010.15"}],"container-title":["Journal of Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1057\/jit.2010.15\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/jit.2010.15","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1057\/jit.2010.15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1057\/jit.2010.15.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T17:05:00Z","timestamp":1728147900000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1057\/jit.2010.15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["10.1057\/jit.2010.15"],"URL":"https:\/\/doi.org\/10.1057\/jit.2010.15","relation":{},"ISSN":["0268-3962","1466-4437"],"issn-type":[{"type":"print","value":"0268-3962"},{"type":"electronic","value":"1466-4437"}],"subject":[],"published":{"date-parts":[[2011,3]]}}}