{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:07:56Z","timestamp":1759032476446,"version":"3.41.2"},"reference-count":50,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,9,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To articulate the interpretations and adaptations of Grounded Theory made within the <jats:italic>2G<\/jats:italic> method, and the motivations behind them.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Literature review and conceptual approach reflecting on the authors' experience of having developed the <jats:italic>2G<\/jats:italic> method.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Identifies six adaptations of Grounded Theory as being of particular interest. Five relate to method procedures, namely: developing a core category; coding interview data; exposing evolving theories to stakeholders; developing multiple concept frameworks; and inter\u2010linking concepts. The sixth relates to expectations on method users, and the tension between expertise relating to the phenomenon being analysed, and openness in interpreting the data.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>Shows how Grounded Theory procedures have been adapted and used in IS methods. Specifically, the paper illustrates and makes explicit how a specific method (the <jats:italic>2G<\/jats:italic> method) has evolved.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Provides insights for users of Grounded Theory (GT) and developers of IS methods on how GT procedures have been interpreted and adapted in previous and the authors' own research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Provides insights into how Grounded Theory (GT) procedures have been adapted for use in other IS methods, with insights from the authors' own experience of having developed the <jats:italic>2G<\/jats:italic> method. Reflects on the use of GT procedures in a number of case studies related to tool evaluation. Identifies six areas in which specific interpretations or adaptations of GT were considered necessary in the contexts in which the studies were undertaken, and justifies these six departures from standard interpretations of GT procedures.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09593840510615842","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T17:58:36Z","timestamp":1168883916000},"page":"196-211","source":"Crossref","is-referenced-by-count":28,"title":["On the adaptation of Grounded Theory procedures: insights from the evolution of the <i>2G<\/i> method"],"prefix":"10.1108","volume":"18","author":[{"given":"Brian","family":"Lings","sequence":"first","affiliation":[]},{"given":"Bj\u00f6rn","family":"Lundell","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012519523260700_b1","doi-asserted-by":"crossref","unstructured":"Avison, D. and Fitzgerald, G. (2003), \u201cWhere now for development methodologies?\u201d, Communications of the ACM, Vol. 46 No. 1, pp. 79\u201082.","DOI":"10.1145\/602421.602423"},{"key":"key2022012519523260700_b2","doi-asserted-by":"crossref","unstructured":"Avison, D.E., Wood\u2010Harper, A.T., Vidgen, R.T. and Wood, J.R.G. (1998), \u201cA further exploration into information systems development: the evolution of Multiview2\u201d, Information Technology and People, Vol. 11 No. 2, pp. 124\u201039.","DOI":"10.1108\/09593849810218319"},{"key":"key2022012519523260700_b3","unstructured":"Baskerville, R. and Prie\u2010Heje, J. (1993), \u201cCombining action research and grounded theory: a method for empirical studies of IS practice\u201d, in Bansler, J.P., B\u00f8dker, K., Kensing, F., N\u00f8rbjerg, J. and Pries\u2010Heje, J. (Eds), Proceedings of the 16th IRIS: Information Systems Research Seminar in Scandinavia, Part II, Copenhagen, 7\u201019 August, pp. 331\u201045."},{"key":"key2022012519523260700_b4","doi-asserted-by":"crossref","unstructured":"Baskerville, R. and Pries\u2010Heje, J. (1999), \u201cGrounded action research: a method for understanding IT in practice\u201d, Accounting, Management & Information Technology, Vol. 9, pp. 1\u201023.","DOI":"10.1016\/S0959-8022(98)00017-4"},{"key":"key2022012519523260700_b5","doi-asserted-by":"crossref","unstructured":"Brinton Anderson, B., Bajaj, A. and Gorr, W. (2002), \u201cAn estimation of the decision models of senior IS managers when evaluating the external quality of organizational software\u201d, Journal of Systems and Software, Vol. 61 No. 1, pp. 59\u201075.","DOI":"10.1016\/S0164-1212(01)00114-5"},{"key":"key2022012519523260700_b6","doi-asserted-by":"crossref","unstructured":"Duvall, L.M. (1995), \u201cA study of software management: the state of practice in the United States and Japan\u201d, Journal of Systems and Software, Vol. 31, pp. 109\u201024.","DOI":"10.1016\/0164-1212(94)00091-Z"},{"key":"key2022012519523260700_b7","doi-asserted-by":"crossref","unstructured":"Elliott, G.J., Jones, E. and Barker, P. (2002), \u201cA grounded theory approach to modelling learnability of hypermedia authoring tools\u201d, Interacting with Computers, Vol. 14 No. 5, pp. 547\u201074.","DOI":"10.1016\/S0953-5438(02)00021-8"},{"key":"key2022012519523260700_b8","unstructured":"Fitzgerald, B., Russo, N.L. and Stolterman, E. (2002), Information Systems Development: Methods in Action, McGraw\u2010Hill, London."},{"key":"key2022012519523260700_b10","unstructured":"F\u00f6rs\u00e4kringskassan (1993a), \u201cSlutrapport: Kvalitetsm\u00e4tning \u2013 Ett Projekt f\u00f6r B\u00e4ttre Uppf\u00f6ljning\u201d, Final Report, 1993\u201008\u201013, Diarienummer: 33\u20101993:76, F\u00f6rs\u00e4kringskassan Skaraborg (in Swedish)."},{"key":"key2022012519523260700_b11","unstructured":"F\u00f6rs\u00e4kringskassan (1993b), \u201cDRABANT: Kvalitetsm\u00e4tning av f\u00f6rs\u00e4kringskasse\u00e4renden\u201d, Handbok, F\u00f6rs\u00e4kringskassan Skaraborg (in Swedish)."},{"key":"key2022012519523260700_b13","doi-asserted-by":"crossref","unstructured":"Galal, G.H. (2001), \u201cFrom contexts to constructs: the use of grounded theory in operationalising contingent process models\u201d, European Journal of Information Systems, Vol. 10 No. 1, pp. 2\u201014.","DOI":"10.1057\/palgrave.ejis.3000381"},{"key":"key2022012519523260700_b12","doi-asserted-by":"crossref","unstructured":"Galal, G.H. and Paul, R.J. (1999), \u201cA qualitative scenario approach to managing evolving requirements\u201d, Requirements Engineering, Vol. 4 No. 2, pp. 92\u2010102.","DOI":"10.1007\/s007660050016"},{"key":"key2022012519523260700_b17","doi-asserted-by":"crossref","unstructured":"Glaser, B. (1999), \u201cThe future of grounded theory\u201d, The Grounded Theory Review: An International Journal, Vol. 1 No. 1, pp. 1\u20109.","DOI":"10.1177\/104973299129122199"},{"key":"key2022012519523260700_b15","unstructured":"Glaser, B.G. (1978), Advances in the Methodology of Grounded Theory: Theoretical Sensitivity, The Sociology Press, Mill Valley, CA."},{"key":"key2022012519523260700_b16","unstructured":"Glaser, B.G. (1998), Doing Grounded Theory: Issues and Discussions, Sociology Press, Mill Valley, CA."},{"key":"key2022012519523260700_b14","doi-asserted-by":"crossref","unstructured":"Glaser, B.G. and Strauss, A. (1967), The Discovery of Grounded Theory: Strategies for Qualitative Research, Weidenfeld and Nicolson, London.","DOI":"10.1097\/00006199-196807000-00014"},{"key":"key2022012519523260700_b18","doi-asserted-by":"crossref","unstructured":"Grinter, R.E. (1996), \u201cUnderstanding the role of configuration management systems in software development\u201d, in Carroll, J.M. and Tanner, P.P. (Eds), Proceedings of the CHI '96 Conference, Companion on Human Factors in Computing Systems: Common Ground, ACM Press, New York, NY, pp. 39\u201040.","DOI":"10.1145\/257089.257122"},{"key":"key2022012519523260700_b19","unstructured":"Howcroft, D. and Hughes, J. (1999), \u201cGrounded Theory: I mentioned it once but I think I got away with it\u201d, in Brooks, L. and Kimble, C. (Eds), Information Systems: The Next Generation: Proceedings of the 4th UKAIS Conference, McGraw\u2010Hill, New York, NY, pp. 129\u201041."},{"key":"key2022012519523260700_b20","unstructured":"Hughes, J. (1998), \u201cThe Development of the GIST (Grounding Information SysTems) methodology: determining situated requirements in information systems analysis\u201d, PhD thesis, Information Systems Research Centre, University of Salford, Salford."},{"key":"key2022012519523260700_b21","unstructured":"Hughes, J. and Howcroft, D. (2000), \u201cGrounded theory: never knowingly understood\u201d, Information Systems Review, Vol. 1, pp. 181\u201099."},{"key":"key2022012519523260700_b22","unstructured":"ISO (1995), \u201cInformation Technology \u2013 Guideline for the evaluation and selection of CASE tools\u201d, ISO\/IEC JTC1\/SC7\/WG4, ISO\/IEC 14102:1995(E) ISO, Geneva."},{"key":"key2022012519523260700_b23","unstructured":"ITS (1995), \u201cSammantr\u00e4de med ITS\/AG7, Systemutveckling\u201d, Protokoll nr 39, ITS 21\/7, 1 March (in Swedish)."},{"key":"key2022012519523260700_b24","doi-asserted-by":"crossref","unstructured":"Kendall, J. (1999), \u201cAxial coding and grounded theory controversy\u201d, Western Journal of Nursing Research, Vol. 21 No. 6, p. 743.","DOI":"10.1177\/01939459922044162"},{"key":"key2022012519523260700_b25","unstructured":"Krogh, B. and Mathiassen, L. (1998), \u201cCoordinating problems and methods features\u201d, Thirty\u2010First Annual Hawaii International Conference on System Sciences, Vol. 5, IEEE Computer Society, Washington, DC, pp. 333\u201042."},{"key":"key2022012519523260700_b26","doi-asserted-by":"crossref","unstructured":"Kunda, D. and Brooks, L. (2000), \u201cAssessing organisational obstacles to component\u2010based development: a case study approach\u201d, Information and Software Technology, Vol. 42 No. 10, pp. 715\u201025.","DOI":"10.1016\/S0950-5849(00)00115-4"},{"key":"key2022012519523260700_b27","unstructured":"Lings, B. and Lundell, B. (2004), \u201cOn transferring a method into a usage situation\u201d, in Kaplan, B., Truex, D., Wastell, D., Wood\u2010Harper, T. and DeGross, J. (Eds), IFIP Working Group 8.2 Conference IS Research Methods Conference: Relevant Theory and Informed Practice: Looking Forward from a 20 Year Perspective on IS Research, Kluwer, Boston, MA, pp. 535\u201053."},{"key":"key2022012519523260700_b28","unstructured":"Lundell, B. (1995), \u201cA few comments on the DIS: CASE tool evaluation\u201d, personal comment concerning ISO 14102 (DIS), submitted by e\u2010mail for meeting with ITS\/AG7, 22 February 1995 (accepted as Swedish comment at meeting ITS 1995)."},{"key":"key2022012519523260700_b29","unstructured":"Lundell, B. and Lings, B. (1997), \u201cEvaluation and selection of CASE\u2010tools within the ISO framework: qualitative issues\u201d, in Sutton, D.J. (Ed.), The Eighth Australasian Conference on Information Systems (ACIS'97), Adelaide, 29 September\u20102 October, pp. 243\u201054."},{"key":"key2022012519523260700_b30","doi-asserted-by":"crossref","unstructured":"Lundell, B. and Lings, B. (2002), \u201cComments on ISO 14102: the standard for CASE\u2010tool evaluation\u201d, Computer Standards & Interfaces, Vol. 24 No. 5, pp. 381\u20108.","DOI":"10.1016\/S0920-5489(02)00064-8"},{"key":"key2022012519523260700_b31","doi-asserted-by":"crossref","unstructured":"Lundell, B. and Lings, B. (2003), \u201cThe 2G method for doubly grounding evaluation frameworks\u201d, Information Systems Journal, Vol. 13 No. 4, pp. 375\u201098.","DOI":"10.1046\/j.1365-2575.2003.00154.x"},{"key":"key2022012519523260700_b32","doi-asserted-by":"crossref","unstructured":"Lundell, B. and Lings, B. (2004a), \u201cMethod in action and method in tool: a stakeholder perspective\u201d, Journal of Information Technology, Vol. 19 No. 3, pp. 215\u201023.","DOI":"10.1057\/palgrave.jit.2000022"},{"key":"key2022012519523260700_b33","doi-asserted-by":"crossref","unstructured":"Lundell, B. and Lings, B. (2004b), \u201cOn understanding evaluation of tool support for IS development\u201d, Australasian Journal of Information Systems, Vol. 12 No. 1, pp. 39\u201053.","DOI":"10.3127\/ajis.v12i1.104"},{"key":"key2022012519523260700_b34","doi-asserted-by":"crossref","unstructured":"Lundell, B., Lings, B. and Gustafsson, P.\u2010O. (1999), \u201cMethod support for developing evaluation frameworks for CASE tool evaluation\u201d, in Khosrowpour, M. (Ed.), 1999 Information Resources Management Association International Conference \u2013 Track: Computer\u2010Aided Software Engineering Tools, IDEA Group Publishing, Hershey, PA, pp. 350\u20108.","DOI":"10.1007\/978-1-4615-4261-2_11"},{"key":"key2022012519523260700_b35","doi-asserted-by":"crossref","unstructured":"Lundell, B., Lings, B., Mattsson, A. and \u00c4rlig, U. (2004), \u201cTaking steps to improve working practice: a company experience of method transfer\u201d, in Fitzgerald, B. and Wynn, E. (Eds), IT Innovation for Adaptability and Competitiveness, Kluwer, Boston, MA, pp. 173\u20108.","DOI":"10.1007\/1-4020-8000-X_10"},{"key":"key2022012519523260700_b36","doi-asserted-by":"crossref","unstructured":"Mathiassen, L., Munk\u2010Madsen, A., Nielsen, P.A. and Stage, J. (1997), \u201cWho's the customer?\u201d, in Brinkkemper, S., Lyytinen, K. and Welke, R.J. (Eds), Method Engineering: Principles of Method Construction and Tool Support, Chapman & Hall, London, pp. 232\u201045.","DOI":"10.1007\/978-0-387-35080-6_15"},{"key":"key2022012519523260700_b37","doi-asserted-by":"crossref","unstructured":"Morisio, M., Seaman, C.B., Basili, V.R., Parra, A.T., Kraft, S.E. and Condon, S.E. (2002), \u201cCOTS\u2010based software development: processes and open issues\u201d, Journal of Systems and Software, Vol. 61 No. 3, pp. 189\u201099.","DOI":"10.1016\/S0164-1212(01)00147-9"},{"key":"key2022012519523260700_b38","unstructured":"Nilsson, A. (1995), \u201cEvolution of methodologies for information systems work: a historical perspective\u201d, in Dahlbom, B. (Ed.), The Infological Equation: Essays in Honor of B\u00f6rje Langefors, Gothenburg Studies in Information Systems, Report 6, March, pp. 251\u201085."},{"key":"key2022012519523260700_b39","doi-asserted-by":"crossref","unstructured":"Ramesh, B., Pries\u2010Heje, J. and Baskerville, R. (2002), \u201cInternet software engineering: a different class of process\u201d, Annals of Software Engineering, Vol. 14 Nos 1\u20104, pp. 169\u201095.","DOI":"10.1023\/A:1020557725165"},{"key":"key2022012519523260700_b40","doi-asserted-by":"crossref","unstructured":"Rehbinder, A., Lings, B., Lundell, B., Burman, R. and Nilsson, A. (2002), \u201cDeveloping a framework for pre\u2010usage evaluations of CASE\u2010tools: a case\u2010study\u201d, in Harindranath, G., Rosenberg, D., Sillince, J.A.A., Wojtkowski, W., Wojtkowski, W.G., Wrycza, S. and Zupancic, J. (Eds), New Perspectives on Information Systems Development: Theory, Methods and Practice, Kluwer\/Plenum Press, New York, NY, pp. 519\u201034.","DOI":"10.1007\/978-1-4615-0595-2_42"},{"key":"key2022012519523260700_b41","doi-asserted-by":"crossref","unstructured":"Scott, L., Carvalho, L., Jeffery, R., Ambra, J.D. and Becker\u2010Kornstaedt, U. (2002), \u201cUnderstanding the use of an electronic process guide\u201d, Information and Software Technology, Vol. 44 No. 10, pp. 601\u201016.","DOI":"10.1016\/S0950-5849(02)00080-0"},{"key":"key2022012519523260700_b42","doi-asserted-by":"crossref","unstructured":"Seaman, C.B. (1999), \u201cQualitative method in empirical studies of software engineering\u201d, IEEE Transactions on Software Engineering, Vol. 25 No. 4, pp. 557\u201072.","DOI":"10.1109\/32.799955"},{"key":"key2022012519523260700_b43","doi-asserted-by":"crossref","unstructured":"Seaman, C.B. and Basili, V.R. (1997), \u201cAn empirical study of communication in code inspection\u201d, International Conference on Software Engineering, JCSE 97, Boston, MA, pp. 96\u2010106.","DOI":"10.1145\/253228.253248"},{"key":"key2022012519523260700_b44","doi-asserted-by":"crossref","unstructured":"Seaman, C.B. and Basili, V.R. (1998), \u201cCommunication and organization: an empirical study of discussion in inspection meetings\u201d, IEEE Transactions on Software Engineering, Vol. 24 No. 6, pp. 559\u201072.","DOI":"10.1109\/32.708569"},{"key":"key2022012519523260700_b45","unstructured":"Starrin, B., Larsson, G., Dahlgren, L. and Styrborn, S. (1991), Fr\u00e5n uppt\u00e4ckt till presentation: om kvalitativ metod och teorigenerering p\u00e5 empirisk grund, Studentlitteratur, Lund."},{"key":"key2022012519523260700_b46","unstructured":"Starrin, B., Dahlgren, L., Larsson, G. and Styrborn, S. (1997), Along the Path of Discovery: Qualitative Methods and Grounded Theory, Studentlitteratur, Lund."},{"key":"key2022012519523260700_b47","unstructured":"Strauss, A.L. and Corbin, J. (1990), Basics of Qualitative Research: Grounded Theory Procedures and Techniques, Sage Publications, Beverly Hills, CA."},{"key":"key2022012519523260700_b48","doi-asserted-by":"crossref","unstructured":"Urquhart, C. (2001), \u201cAn encounter with grounded theory: tackling the practical and philosophical issues\u201d, in Trauth, E. (Ed.), Qualitative Research in Information Systems: Issues and Trends, Idea Group Publishing, Hershey, PA, pp. 104\u201040.","DOI":"10.4018\/978-1-930708-06-8.ch005"},{"key":"key2022012519523260700_b49","doi-asserted-by":"crossref","unstructured":"Ward, P.T. (1991), \u201cThe evolution of structured analysis, part I: the early years\u201d, American Programmer, Vol. 4 No. 11, pp. 4\u201016.","DOI":"10.1080\/0957514910110202"},{"key":"key2022012519523260700_b50","unstructured":"Ward, P.T. (1992), \u201cThe evolution of structured analysis, part II: maturity and its problems\u201d, American Programmer, Vol. 5 No. 4, pp. 18\u201029."},{"key":"key2022012519523260700_frg9","doi-asserted-by":"crossref","unstructured":"Fitzgerald, B., Russo, N.L. and O'Kane, T. (2003), \u201cSoftware development method tailoring at Motorola\u201d, Communications of the ACM, Vol. 46 No. 4, pp. 65\u201070.","DOI":"10.1145\/641205.641206"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593840510615842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840510615842\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840510615842\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:45Z","timestamp":1753403805000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/18\/3\/196-211\/180051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,1]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,9,1]]}},"alternative-id":["10.1108\/09593840510615842"],"URL":"https:\/\/doi.org\/10.1108\/09593840510615842","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2005,9,1]]}}}