{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T09:45:20Z","timestamp":1744623920927},"reference-count":60,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2008,6,28]],"date-time":"2008-06-28T00:00:00Z","timestamp":1214611200000},"content-version":"vor","delay-in-days":4380,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[1996,7]]},"abstract":"Abstract. <\/jats:bold> A wide variety of approaches can be applied under the heading of case study research; this paper explicitly discusses the range of the alternatives. Many papers discussing case study research emphasize one particular variation of case study research only. The current paper provides an overview of the various uses of case study research in the information systems field by describing the different ways in which case study research can be used, using examples from published IS literature for illustration, and providing references to other method papers for more detailed discussion of each alternative. Researchers are reminded that case study research can be used in the positivist and interpretivist traditions, for testing or building theory, with a single or multiple case study design, using qualitative or mixed methods. The range of case study research alternatives makes it a highly versatile research strategy for IS<\/jats:p>","DOI":"10.1111\/j.1365-2575.1996.tb00015.x","type":"journal-article","created":{"date-parts":[[2008,3,25]],"date-time":"2008-03-25T11:37:34Z","timestamp":1206445054000},"page":"227-242","source":"Crossref","is-referenced-by-count":329,"title":["Case study research: a multi\u2010faceted research approach for IS"],"prefix":"10.1111","volume":"6","author":[{"given":"A.L.M.","family":"Cavaye","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,6,28]]},"reference":[{"key":"e_1_2_1_2_1","first-page":"58","article-title":"Can the field of MIS be disciplined","volume":"31","author":"Banville C.","year":"1989","journal-title":"Communications of the ACM"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/249125"},{"key":"e_1_2_1_5_1","first-page":"193","volume-title":"Research Methods in Information Systems","author":"Boland R.J.","year":"1985"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/3151365"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/001041407500800204"},{"key":"e_1_2_1_8_1","volume-title":"Case Study Research \u2014 Design and Methods","author":"Campbell D.R.","year":"1989"},{"key":"e_1_2_1_9_1","volume-title":"The Information Systems Research Challenge","author":"Cash J.I.","year":"1989"},{"key":"e_1_2_1_10_1","volume-title":"Systems Thinking, Systems Practice","author":"Checkland P.","year":"1981"},{"key":"e_1_2_1_11_1","first-page":"601","article-title":"Radical development in accounting thought","volume":"61","author":"Chua W.F.","year":"1986","journal-title":"The Accounting Review"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00988593"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/258920"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/258557"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2307\/258921"},{"key":"e_1_2_1_16_1","first-page":"205","volume-title":"Critical Issues in IS Research","author":"Franz C.R.","year":"1989"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1994.12"},{"key":"e_1_2_1_18_1","volume-title":"Research Methods in Information Systems","author":"Galliers R.D.","year":"1985"},{"key":"e_1_2_1_19_1","volume-title":"Information Systems Research: Contemporary Approaches and Emergent Traditions","author":"Galliers R.D.","year":"1991"},{"key":"e_1_2_1_20_1","first-page":"144","volume-title":"Information Systems Research \u2014 Issues, Methods and Practice Guidelines","author":"Galliers R.D.","year":"1992"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/32206.315753"},{"key":"e_1_2_1_22_1","volume-title":"Theoretical Sensitivity \u2014 Advances in the Methodology of Grounded Theory","author":"Glaser B.G.","year":"1978"},{"key":"e_1_2_1_23_1","volume-title":"The Discovery of Grounded Theory","author":"Glaser B.G.","year":"1967"},{"key":"e_1_2_1_24_1","first-page":"173","volume-title":"Proceedings of the International Conference on Information Systems","author":"Grant R.A.","year":"1989"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392366"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Kaplan B.&Duchon D.(1988)Combining qualitative methods in information systems research: a case study.MIS Quarterly570\u2013586.","DOI":"10.2307\/249133"},{"key":"e_1_2_1_27_1","first-page":"27","volume-title":"Information Systems Research: Contemporary Approaches and Emergent Traditions","author":"Keen P.G.W.","year":"1991"},{"key":"e_1_2_1_28_1","first-page":"1","volume-title":"Information Systems Research: Contemporary Approaches and Emergent Traditions","author":"Klein H.K.","year":"1991"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/248698"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872678904200202"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2.4.342"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.4.1.24"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392367"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.1991.tb00025.x"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/358141.358148"},{"key":"e_1_2_1_36_1","first-page":"20","volume-title":"The Information Systems Research Challenge: Qualitative Research Methods","author":"Markus M.L.","year":"1989"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392365"},{"key":"e_1_2_1_38_1","volume-title":"Analyzing Qualitative Data: a source book for new methods","author":"Miles M.B.","year":"1984"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392364"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.1.1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/249774"},{"key":"e_1_2_1_42_1","first-page":"53","volume-title":"Research Methods in Information Systems","author":"Pettigrew A.M.","year":"1985"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.325"},{"key":"e_1_2_1_44_1","volume-title":"Qualitative and Quantitative Methods in Evaluation Research","author":"Reichardt C.","year":"1989"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392359"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1086\/225467"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.2307\/249731"},{"key":"e_1_2_1_48_1","volume-title":"Research Methods in Organisational Behaviour","author":"Stone E.","year":"1978"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511557842"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392581"},{"key":"e_1_2_1_51_1","volume-title":"On the reconciliation of qualitative and Quantitative Methods in Evaluation research","author":"Trend M.G.","year":"1989"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392360"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392358"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1995.9"},{"key":"e_1_2_1_55_1","volume-title":"The Information Systems Research Challenge","author":"Weick K.E.","year":"1984"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1989.11517849"},{"key":"e_1_2_1_57_1","first-page":"145","volume-title":"Proceedings of the International Conference on Information Systems, Orlando, 1993","author":"Yetton P.W.","year":"1993"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392599"},{"key":"e_1_2_1_59_1","volume-title":"The Information Systems Research Challenge: Qualitative Research Methods","author":"Yin R.K.","year":"1989"},{"key":"e_1_2_1_60_1","volume-title":"Case Study Research \u2010 design and methods","author":"Yin R.K.","year":"1989"},{"key":"e_1_2_1_61_1","volume-title":"In the age of the smart machine","author":"Zuboff S.","year":"1988"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fj.1365-2575.1996.tb00015.x","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/j.1365-2575.1996.tb00015.x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T15:30:50Z","timestamp":1698420650000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1365-2575.1996.tb00015.x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,7]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1996,7]]}},"alternative-id":["10.1111\/j.1365-2575.1996.tb00015.x"],"URL":"https:\/\/doi.org\/10.1111\/j.1365-2575.1996.tb00015.x","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[1996,7]]}}}