{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:37:51Z","timestamp":1743151071832,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319086170"},{"type":"electronic","value":"9783319086187"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08618-7_25","type":"book-chapter","created":{"date-parts":[[2014,8,25]],"date-time":"2014-08-25T10:59:47Z","timestamp":1408964387000},"page":"255-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mixed Method for New Scholars with Intrusive, Emerging and Complex Socio-Technical Topics"],"prefix":"10.1007","author":[{"given":"Ibrahim","family":"Shafiu","sequence":"first","affiliation":[]},{"given":"William Yu Chung","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Harminder","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,26]]},"reference":[{"issue":"2","key":"25_CR1","first-page":"193","volume":"16","author":"N Mackenzie","year":"2006","unstructured":"Mackenzie, N., Knipe, S.: Research dilemmas: paradigms, methods and methodology. Issues Educ. Res. 16(2), 193\u2013205 (2006)","journal-title":"Issues Educ. Res."},{"key":"25_CR2","volume-title":"Qualitative Inquiry and Research Design: Choosing Among Five Approaches","author":"JW Creswell","year":"2007","unstructured":"Creswell, J.W.: Qualitative Inquiry and Research Design: Choosing Among Five Approaches. Sage Publications Incorporated, Thousand Oaks (2007)"},{"key":"25_CR3","volume-title":"Research Design: Quantitative, Qualitative, and Mixed Methods Approaches","author":"JW Creswell","year":"2003","unstructured":"Creswell, J.W.: Research Design: Quantitative, Qualitative, and Mixed Methods Approaches, 2nd edn. Sage Publications, Thousand Oaks (2003)","edition":"2"},{"issue":"1","key":"25_CR4","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5465\/AMJ.2007.24160888","volume":"50","author":"KM Eisenhardt","year":"2007","unstructured":"Eisenhardt, K.M., Graebner, M.E.: Theory building from cases: opportunities and challenges. Acad. Manag. J. 50(1), 25\u201332 (2007)","journal-title":"Acad. Manag. J."},{"issue":"7","key":"25_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3102\/0013189X033007014","volume":"33","author":"RB Johnson","year":"2004","unstructured":"Johnson, R.B., Onwuegbuzie, A.J.: Mixed methods research: a research paradigm whose time has come. Educ. Res. 33(7), 14\u201326 (2004)","journal-title":"Educ. Res."},{"issue":"3","key":"25_CR6","doi-asserted-by":"crossref","first-page":"463","DOI":"10.2307\/25750687","volume":"34","author":"S Smith","year":"2010","unstructured":"Smith, S., et al.: Circuits of power: a study of mandated compliance to an information systems security de jure standard in a government organization. MIS Q. 34(3), 463\u2013486 (2010)","journal-title":"MIS Q."},{"issue":"5","key":"25_CR7","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.im.2003.08.001","volume":"41","author":"AG Kotulic","year":"2004","unstructured":"Kotulic, A.G., Clark, J.G.: Why there aren\u2019t more information security research studies. Inf. Manag. 41(5), 597\u2013607 (2004)","journal-title":"Inf. Manag."},{"issue":"1","key":"25_CR8","first-page":"1","volume":"33","author":"R Atkinson","year":"2001","unstructured":"Atkinson, R., Flint, J.: Accessing hidden and hard-to-reach populations: snowball research strategies. Soc. Res. Update 33(1), 1\u20134 (2001)","journal-title":"Soc. Res. Update"},{"issue":"7","key":"25_CR9","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.jom.2011.06.007","volume":"29","author":"A Marucheck","year":"2011","unstructured":"Marucheck, A., et al.: Product safety and security in the global supply chain: issues, challenges and research opportunities. J. Oper. Manag. 29(7), 707\u2013720 (2011)","journal-title":"J. Oper. Manag."},{"key":"25_CR10","volume-title":"Research Design","author":"JW Creswell","year":"1994","unstructured":"Creswell, J.W.: Research Design. Sage Publications, Thousand Oaks (1994)"},{"issue":"1","key":"25_CR11","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S0957-4174(00)00048-8","volume":"20","author":"D-J Wu","year":"2001","unstructured":"Wu, D.-J.: Software agents for knowledge management: coordination in multi-agent supply chains and auctions. Expert Syst. Appl. 20(1), 51\u201364 (2001)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"25_CR12","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1023\/A:1011449109160","volume":"2","author":"ME Nissen","year":"2001","unstructured":"Nissen, M.E.: Agent-based supply chain integration. Inf. Technol. Manage. 2(3), 289\u2013312 (2001)","journal-title":"Inf. Technol. Manage."},{"issue":"2","key":"25_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.is.2011.09.003","volume":"37","author":"M Dumas","year":"2012","unstructured":"Dumas, M., Recker, J.C., Weske, M.: Management and engineering of process aware information systems: introduction to the special issue. Inf. Syst. 37(2), 77\u201379 (2012)","journal-title":"Inf. Syst."},{"issue":"3","key":"25_CR14","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.ssci.2010.09.019","volume":"49","author":"Y-C Yang","year":"2011","unstructured":"Yang, Y.-C.: Risk management of Taiwan\u2019s maritime supply chain security. Saf. Sci. 49(3), 382\u2013393 (2011)","journal-title":"Saf. Sci."},{"issue":"2","key":"25_CR15","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1037\/0022-0167.52.2.224","volume":"52","author":"WE Hanson","year":"2005","unstructured":"Hanson, W.E., et al.: Mixed methods research designs in counseling psychology. J. Couns. Psychol. 52(2), 224 (2005)","journal-title":"J. Couns. Psychol."},{"issue":"2","key":"25_CR16","doi-asserted-by":"publisher","first-page":"140","DOI":"10.5172\/mra.3.2.140","volume":"3","author":"R Cameron","year":"2009","unstructured":"Cameron, R.: A sequential mixed model research design: design, analytical and display issues. Int. J. Multiple Res. Approaches 3(2), 140\u2013152 (2009)","journal-title":"Int. J. Multiple Res. Approaches"},{"issue":"1","key":"25_CR17","doi-asserted-by":"crossref","first-page":"21","DOI":"10.25300\/MISQ\/2013\/37.1.02","volume":"37","author":"V Venkatesh","year":"2013","unstructured":"Venkatesh, V., Brown, S., Bala, H.: Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems. MIS Q. 37(1), 21\u201354 (2013)","journal-title":"MIS Q."},{"issue":"2","key":"25_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1177\/1558689806298224","volume":"1","author":"RB Johnson","year":"2007","unstructured":"Johnson, R.B., Onwuegbuzie, A.J., Turner, L.A.: Toward a definition of mixed methods research. J. Mixed Methods Res. 1(2), 112\u2013133 (2007)","journal-title":"J. Mixed Methods Res."},{"issue":"7","key":"25_CR19","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1016\/j.jom.2011.06.003","volume":"29","author":"C Speier","year":"2011","unstructured":"Speier, C., et al.: Global supply chain design considerations: mitigating product safety and security risks. J. Oper. Manag. 29(7), 721\u2013736 (2011)","journal-title":"J. Oper. Manag."},{"issue":"6","key":"25_CR20","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1177\/1077800410364609","volume":"16","author":"VLP Clark","year":"2010","unstructured":"Clark, V.L.P.: The adoption and practice of mixed methods: US trends in federally funded health-related research. Qual. Inq. 16(6), 428\u2013440 (2010)","journal-title":"Qual. Inq."},{"issue":"1","key":"25_CR21","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1177\/1468794106058877","volume":"6","author":"A Bryman","year":"2006","unstructured":"Bryman, A.: Integrating quantitative and qualitative research: how is it done? Qual. Res. 6(1), 97\u2013113 (2006)","journal-title":"Qual. Res."},{"issue":"1","key":"25_CR22","first-page":"67","volume":"4","author":"KM Collins","year":"2006","unstructured":"Collins, K.M., Onwuegbuzie, A.J., Sutton, I.L.: A model incorporating the rationale and purpose for conducting mixed methods research in special education and beyond. Learn. Disabil.: Contemp. J. 4(1), 67\u2013100 (2006)","journal-title":"Learn. Disabil.: Contemp. J."},{"issue":"2","key":"25_CR23","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1177\/004912418101000205","volume":"10","author":"P Biernacki","year":"1981","unstructured":"Biernacki, P., Waldorf, D.: Snowball sampling: problems and techniques of chain referral sampling. Sociol. Methods Res. 10(2), 141\u2013163 (1981)","journal-title":"Sociol. Methods Res."},{"key":"25_CR24","volume-title":"Designing and Conducting Mixed Methods Research","author":"JW Creswell","year":"2007","unstructured":"Creswell, J.W., Clark, V.L.P.: Designing and Conducting Mixed Methods Research. Wiley Online Library, New York (2007)"},{"issue":"3","key":"25_CR25","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1207\/s15430421tip3903_2","volume":"39","author":"JW Creswell","year":"2000","unstructured":"Creswell, J.W., Miller, D.L.: Determining validity in qualitative inquiry. Theor. Pract. 39(3), 124\u2013130 (2000)","journal-title":"Theor. Pract."},{"issue":"3","key":"25_CR26","doi-asserted-by":"publisher","first-page":"255","DOI":"10.3102\/01623737011003255","volume":"11","author":"JC Greene","year":"1989","unstructured":"Greene, J.C., Caracelli, V.J., Graham, W.F.: Toward a conceptual framework for mixed-method evaluation designs. Educ. Eval. Policy Anal. 11(3), 255\u2013274 (1989)","journal-title":"Educ. Eval. Policy Anal."},{"issue":"7","key":"25_CR27","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1108\/01443570610672202","volume":"26","author":"K Burgess","year":"2006","unstructured":"Burgess, K., Singh, P.J., Koroglu, R.: Supply chain management: a structured literature review and implications for future research. Int. J. Oper. Prod. Manag. 26(7), 703\u2013729 (2006)","journal-title":"Int. J. Oper. Prod. Manag."},{"issue":"2","key":"25_CR28","first-page":"5","volume":"48","author":"MD Voss","year":"2009","unstructured":"Voss, M.D., Whipple, J.M., Closs, D.J.: The role of strategic security: internal and external security measures with security performance implications. Transp. J. (Am. Soc. Transp. Logist. Inc.) 48(2), 5\u201323 (2009)","journal-title":"Transp. J. (Am. Soc. Transp. Logist. Inc.)"},{"issue":"7","key":"25_CR29","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1108\/09600030910996260","volume":"39","author":"JM Whipple","year":"2009","unstructured":"Whipple, J.M., Voss, M.D., Closs, D.J.: Supply chain security practices in the food industry: do firms operating globally and domestically differ? Int. J. Phys. Distrib. Logist. Manag. 39(7), 574\u2013594 (2009)","journal-title":"Int. J. Phys. Distrib. Logist. Manag."},{"issue":"3","key":"25_CR30","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25750689","volume":"34","author":"JL Spears","year":"2010","unstructured":"Spears, J.L., Barki, H.: User participation in information systems security risk management. MIS Q. 34(3), 503\u2013A5 (2010)","journal-title":"MIS Q."},{"issue":"(3-part-2)","key":"25_CR31","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1287\/isre.1110.0393","volume":"23","author":"C Hsu","year":"2012","unstructured":"Hsu, C., Lee, J.-N., Straub, D.W.: Institutional influences on information systems security innovations. Inf. Syst. Res. 23((3-part-2)), 918\u2013939 (2012)","journal-title":"Inf. Syst. Res."},{"issue":"3","key":"25_CR32","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.dss.2010.03.007","volume":"49","author":"P Trkman","year":"2010","unstructured":"Trkman, P., et al.: The impact of business analytics on supply chain performance. Decis. Support Syst. 49(3), 318\u2013327 (2010)","journal-title":"Decis. Support Syst."},{"issue":"4","key":"25_CR33","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1016\/j.dss.2011.11.017","volume":"52","author":"O Lavastre","year":"2012","unstructured":"Lavastre, O., Gunasekaran, A., Spalanzani, A.: Supply chain risk management in French companies. Decis. Support Syst. 52(4), 828\u2013838 (2012)","journal-title":"Decis. Support Syst."},{"issue":"6","key":"25_CR34","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1093\/fampra\/13.6.522","volume":"13","author":"MN Marshall","year":"1996","unstructured":"Marshall, M.N.: Sampling for qualitative research. Fam. Pract. 13(6), 522\u2013526 (1996)","journal-title":"Fam. Pract."},{"issue":"2","key":"25_CR35","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1037\/0022-0167.52.2.137","volume":"52","author":"DE Polkinghorne","year":"2005","unstructured":"Polkinghorne, D.E.: Language and meaning: Data collection in qualitative research. J. Couns. Psychol. 52(2), 137 (2005)","journal-title":"J. Couns. Psychol."}],"container-title":["Lecture Notes in Business Information Processing","Knowledge Management in Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08618-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T09:51:13Z","timestamp":1675245073000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08618-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319086170","9783319086187"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08618-7_25","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}