Compiled by KEM Krauss © Rhodes University 2014 THIS WILL BE THE TITLE OF THE THESIS OR DISSERTATION Submitted in (partial) fulfilment of the requirements for the degree of ….. (DEGREE)…. IN INFORMATION SYSTEMS (FACULTY OF COMMERCE) RHODES UNIVERSITY by Full Name/s & Surname MONTH AND YEAR i Compiled by KEM Krauss © Rhodes University 2014 THIS WILL BE THE TITLE OF THE THESIS OR DISSERTATION by Full Name/s & Surname SUPERVISOR/S: PROF/DR/MR/MS …… DEPARTMENT: DEPARTMENT OF INFORMATION SYSTEMS FACULTY: FACULTY OF COMMERCE, RHODES UNIVERSITY DEGREE: ….. ABSTRACT An abstract is a brief overview of the research project, typically between 150 and 450 words. An abstract should contain the following: topic area or discipline, problem or issue under investigation, methodological approach, and the contribution to research and/or value to the reader and community (i.e. briefly reflect on the results of the research) (see Hofstee, 2006, p. 168). Normally an abstract does not contain any references. At the end of the abstract you should have 3 to 6 keywords pertaining to your dissertation or thesis, that could be used by libraries and online databases to search for and within your research project. Typically the abstract is something you do right at the end, after completing your chapters. Dissertation and Thesis as concepts are typically used interchangeably. However, in the correct sense of the word, Thesis implies an original contribution. We suggest, therefore, that for Honours and Masters level research you refer to a Dissertation, while for PhD level research you refer to a Thesis. KEYWORDS: Keyword1; Keyword2; Keyword3; …. (3 to 6 keywords) ii Compiled by KEM Krauss © Rhodes University 2014 Declaration I declare that the Dissertation/Thesis entitled, ……. , which I hereby submit for the degree, …… at Rhodes University, is my own work. I also declare that this thesis/dissertation has not previously been submitted by me for a degree at this or any other tertiary institution and that all the sources that I have used or quoted have been indicated and acknowledged by means of complete references. ________________ Name Surname (signed) iii Compiled by KEM Krauss © Rhodes University 2014 Acknowledgements I wish to thank my supervisor, Prof …… for the way in which she empowered me to do and complete my research …. iv Compiled by KEM Krauss © Rhodes University 2014 Table of Contents (The ToC should be auto-generated in MS Word) List of Figures _____________________________________________________________ 3 List of Tables ______________________________________________________________ 3 CHAPTER 1 .............................................................................................................................. 4 Introduction and project overview ............................................................................................ 4 1.1 1.2 1.3 1.4 1.5 1.6 Introduction and background ............................................................................................................ 4 Problem statement and research questions ........................................................................................ 4 Overview of the methodological approach ....................................................................................... 5 Research contribution ....................................................................................................................... 6 Terms and definitions ....................................................................................................................... 6 Thesis structure ................................................................................................................................. 6 CHAPTER 2 .............................................................................................................................. 7 Review of Literature .................................................................................................................. 7 2.1 Introduction....................................................................................................................................... 7 2.2 Preliminary literature review ............................................................................................................ 7 2.3 Literature review continued .............................................................................................................. 8 2.4 PhD research and research contributions .......................................................................................... 9 2.4.1 Guidelines for referencing and quoting ...................................................................................... 10 2.4.1.1 Other writing guidelines .................................................................................................... 10 2.5 Conceptual model and summary of literature ................................................................................. 11 2.6 Conclusion ...................................................................................................................................... 11 CHAPTER 3 ............................................................................................................................ 12 Research Methodology ............................................................................................................ 12 3.1 3.2 3.3 3.4 Introduction..................................................................................................................................... 12 Research design .............................................................................................................................. 12 Ethical clearance procedures........................................................................................................... 13 Conclusions..................................................................................................................................... 14 CHAPTER 4 ............................................................................................................................ 15 Data analysis and results ........................................................................................................ 15 4.1 4.2 4.3 4.4 4.5 Introduction..................................................................................................................................... 15 Writing style ................................................................................................................................... 15 Structure.......................................................................................................................................... 15 Methodological rigour and self-assessment .................................................................................... 15 Conclusions..................................................................................................................................... 16 CHAPTER (n) ......................................................................................................................... 16 Conclusions and contributions ............................................................................................... 16 5.1 5.2 5.3 5.4 5.5 Introduction..................................................................................................................................... 16 Summary of the thesis..................................................................................................................... 16 How the research questions were answered .................................................................................... 17 Key contributions ............................................................................................................................ 17 Recommendations and Limitations ................................................................................................. 17 References ............................................................................................................................... 18 Appendices ............................................................................................................................... 20 Appendix A – Field procedures (example from Lubbe, 1998, cited in Krauss, 2007) __ 20 1 Compiled by KEM Krauss © Rhodes University 2014 Appendix B – Example of an Interview guide __________________________________ 21 2 Compiled by KEM Krauss © Rhodes University 2014 List of Figures (auto-generated in MS Word) Figure 1-1: A framework with generic research questions (from Roode, 1993: 7) ................... 5 Figure 2-1: Inverted Pyramid style of writing ........................................................................... 8 List of Tables (auto-generated in MS Word) Table 1-1: Different contributions to knowledge (Ngwenyama, 2014)……………………13 3 Compiled by KEM Krauss © Rhodes University 2014 CHAPTER 1 Introduction and project overview 1.1 Introduction and background The sections, headings, and chapters proposed throughout this template should be seen as guidelines, rather than prescribed rules. Each research project is unique and therefore the thesis/dissertation structure will differ from project to project. The purpose of this section is to introduce the readers (examiners mainly) to the topic area and discipline, and to prepare him/her for the problem statement that you will present in the next section. Typically the first chapter is based loosely on the research proposal, but expanded upon. This is the Normal font style that you will use for all paragraphs of writing; Time New Roman, Font Size 12, 1.5 Line Spacing. 1.2 Problem statement and research questions The problem statement is probably the most important section of your first chapter and should be comprehensive, well-argued, and supported from literature. A problem statement may be divided into sub-problems and specific research questions and/or research objectives. The research problem should be articulated clearly and be supported from literature The student should show a clear understanding of the problem situation The purpose of each research question should be clear One can infer from the research questions which approach will be followed, context/scope of the research, possible research participants, the research paradigm, topic area, etc. Useful references on research questions are Roode (1993) and Alvesson and Sandberg (2013). Roode (1993) holds that research projects always start with a problem or issue, which is usually expressed as a question. These questions typically enquire about the ontological, phenomenological, epistemological, and normative nature of the problem or issue under investigation. Roode (1993) furthermore presents a framework with four generic research 4 Compiled by KEM Krauss © Rhodes University 2014 questions for allowing the researcher to explore different aspects of the problem or situation at hand (see Figure 1.1). “T[t]he uniqueness of each problem situation will dictate which questions would be relevant, and the order in which they should be posed.” (Roode, 1993: 6). What is? How does? The research problem or main research question Why is? How should? Figure 1.1: A framework with generic research questions (from Roode, 1993: 7) The following paragraph explains the meaning of each generic research question according to Roode (1993: 7-8): What is? questions: “These questions explore the fundamental nature or essence of the research problem, exposing the structure of the problem or the meaning of underlying concepts or ideas.” Why is? questions: “The purpose of these questions are to explain the real-life behaviour or characteristics of the phenomenon, determining the relationships between elements thereof.” How does? questions: “These questions are answered by direct observation of the problem or phenomenon under study, and describe its reality.” How should? questions: “These questions focus on normative aspects of the problem and try to determine guidelines for recommendations based on the results of the study.” 1.3 Overview of the methodological approach This section describes the manner in which the research will be undertaken. It can begin by describing the overarching methodological approach (descriptive, historical, quantitative, experimental, interpretive, etc.) and research strategy (case study, action research, experimental, survey, etc.), and then proceed to explain in brief detail the steps involved. Issues addressed could be: how the research will proceed – from start to finish; the population from which a sample will be drawn or the sources of data; what type of analyses or data treatment will be performed; and so forth. Basically this will be like an “abstract” of your methodology chapter. 5 Compiled by KEM Krauss © Rhodes University 2014 For theoretical projects the focus here will be on how you will do a rigorous and systematic review of literature (see Section 2.2). 1.4 Research contribution In this section the student should argue for the relevance and importance of their work, and for the value and contribution that their research is making (see Section 2.5 on different types of contributions). The section should argue the value of answering the research questions and addressing the research objectives. The value of using the proposed method and research paradigm should be explained and articulated. 1.5 Terms and definitions To assist the reader in understanding the research, important terms and definitions used throughout the thesis/dissertation should be provided. It may be useful to also indicate the chapters or sections where the terms and definitions feature or define them in the chapter where they occur. This depends on the type of thesis. 1.6 Thesis structure This section provides an overview of the thesis/dissertation structure and how it is organised. 6 Compiled by KEM Krauss © Rhodes University 2014 CHAPTER 2 Review of Literature 2.1 Introduction Each chapter that follows after Chapter 1 should have an introduction section. In the introduction section the researcher should introduce the reader to the purpose of the chapter, provide an overview of what can be expected, and explain how the chapter aligns with the overall structure and purpose of the thesis/dissertation and research objectives. It is important to argue for and show constructive alignment with the research objectives and research questions. Think about highlighting a golden research thread for the reader. It may be that a chapter addresses a specific objective or research question. This should be highlighted in the introduction section. 2.2 Preliminary literature review (or preliminary overview) Depending on the type of research you are doing (e.g. conceptual, theoretical, empirical, etc.), the second chapter (and possibly one of two following chapters) typically involves a literature review. A literature review is normally organised as follows: Introduction to the literature review A preliminary literature review o Key themes and search terms o Key databases used Body of the literature (Hostee, 2006: 96) (see the inverted pyramid style in Figure 2.1) Conceptual model and summary of literature (or theoretical constraints/boundaries) Conclusions and research questions revisited A preliminary literature review is a section where you demonstrate early on, rigour in the way you systematically reviewed the literature. It is here where you, for example, show which databases and keywords you used to search for relevant literature. This section should also highlight seminal papers and leading authors, conferences, and journals in your topic area. A useful approach would be to follow the guidance of papers and books on how to do a rigorous literature review: e.g. Webster and Watson (2002), Joost et al. (2013), Mingers (2003), Chen and Hirschheim (2004), Sidorova (2008), Shih et al. (2007), and Brown and Roode (2004). 7 Compiled by KEM Krauss © Rhodes University 2014 Webster and Watson (2002), especially, provides a useful start to a rigorous review of literature. For theoretical projects, this is especially important because it constitutes the entire “methodology” that the project will employ for ensuring rigour and relevance. In extreme cases (e.g. PhD level), a methodology chapter (or chapters) will be needed to describe the “theoretical methodology” (see Joost et al., 2013; Brown and Roode, 2004). Figure 2.1: Inverted Pyramid style of writing (Author’s own construct) A literature review (or a coherent paragraph, section, abstract, or introduction) should flow and ultimately lead to the identification and clarification of a knowledge gap. The inverted pyramid style of writing in Figure 2.1 visualises a well-structured literature section/chapter. Read Mthoko and Pade-Khene (2013) and Fourie and Krauss (2011) for examples of conceptual papers can be structured. 2.3 Literature review continued A good literature review shows, that you are aware of what is going on in the field, that there is a theory base for the work you are proposing to do, how your work fits in with what has already been done (it provides detailed context for your work), that your work has significance, and that you work will lead to new knowledge (Hofstee, 2006). 8 Compiled by KEM Krauss © Rhodes University 2014 There are often several types of literature reviews in a research project; i.e. a literature review to understand: the problem situation and context, the body of knowledge or field you are contributing to, the theoretical framework/s upon which your research is based, and appropriate methodologies applicable to your research situation. 2.4 Theoretical projects for Honours students Throughout this template, some comments specific to theoretical projects are made. An alternate approach to structuring the literature review chapters of theoretical projects (this is more a traditional and positivist approach to doing so and your supervisor’s guidance is important here) is as follows: Review of Related Literature – Chapter 2 [The WHAT has been done previously] o Introduction o Broad (context, theory base) o Detailed (works organised by concept/idea) o Conclusion Current Frameworks – Chapter 3 [The most important WHAT has been done previously] New Proposed Framework – Chapter 4 [The WHAT do you propose] 2.5 PhD research and research contributions A PhD should make a new and unique contribution to knowledge. Three types of contribution are possible (see Table 2.1). One of the types of contributions is contribution to theory. Therefore, at PhD level a thorough and rigorous review of literature cannot be overemphasised, and several chapters might be necessary to explore theory. Table 2.1: Different contributions to knowledge (Ngwenyama, 2014) 9 Compiled by KEM Krauss © Rhodes University 2014 Types of contribution Description of claims Potential contents of knowledge claims Theoretical contribution Advancement of theoretical knowledge Proposal of new (better) theories or conceptual frameworks Modifications (improvements) to existing theories or conceptual frameworks Methodological contribution Practice contribution Advancement of design, engineering knowledge (or research methods) Proposal of new (better) methods and techniques Modifications (improvements) to existing methods and techniques Advancement of research Proposal of new (better) practices or professional practice Modifications (improvements) to existing knowledge practices 2.5.1 Guidelines for referencing and quoting For referencing following the Harvard referencing style available from the following links: http://ru.za.libguides.com/content.php?pid=301177&sid=3774854. http://libweb.anglia.ac.uk/referencing/harvard.htm For any direct quote that is more than three consecutive words from a single source, you need to use inverted commas and a page number. For example: Avgerou (2009) names this the “disruptive transformation perspective” which considers the idea of development, including ICT-enabled development, a “contested endeavour or as involving action that affects differently different populations” (p. 9). For direct quotes that are longer than one sentence from a source, format as follows: “Research in the critical tradition is characterised by reflexivity, involving forms of self-conscious criticism as part of a strategy to conduct critical empirical research. Researchers explore their own ontological and epistemological assumptions and preferences that inform their research and influence their engagement with a study. By intentionally expressing, questioning, and reflecting upon their subjective experiences, beliefs, and values, critical researchers expose their ideological and political agendas.” (Čečez-Kecmanović, 2001: 147). 2.5.1.1 Other writing guidelines 10 Compiled by KEM Krauss © Rhodes University 2014 For bullets, use this style. When you emphasise use Italics or Bold, rather than underlining. When you refer to a specific section, chapter or figure use a capital letter, e.g. “In Figure 2.1…” or “from Section 2.4 we learn …”. Otherwise use the small letter, e.g. “In a previous section the researcher …”. Captions for Figures and Tables should have their own style, and should be numbered according to the chapter For information on Rhodes’ plagiarism policies go to: http://www.ru.ac.za/static/policies/plagiarism_policy.pdf. About the “Heading 1” style: In this template, Heading 1 is in hidden style, placed just below or after each chapter title. The reason is to allow for auto-numbering of headings that align with each chapter number. 2.6 Conceptual model and summary Every literature review chapter should include a summary of the literature presented in some form, e.g. a conceptual framework, summarising narrative, model, table, or diagram. This is an important part of the research, since for empirical projects a conceptual framework will demarcate the boundaries of the type of data themes the researcher will seek out from data during the execution of methodology. For theoretical projects, a conceptual framework will offer direction for a more detail and focussed review of literature (e.g. to explore specific and relevant frameworks) in following chapters. A useful and very persuasive approach is to revisit and confirm the research questions at the end of a literature review chapter. 2.7 Conclusion Each chapter will have a conclusion section which briefly revisits the chapter content and its purpose. The author should also show the chapter’s relation to the overall research project (and research questions), and then make the link, for the reader, to the chapter that will follow. 11 Compiled by KEM Krauss © Rhodes University 2014 CHAPTER 3 Research Methodology 3.1 Introduction For theoretical projects, a “second” literature review chapter (and not necessarily a methodology chapter) is necessary. Here the researcher explores specific theoretical frameworks (see Section 2.6) that could be used to answer the research questions. In Section 2.3 the different types of possible literature reviews are explained. For theoretical projects the emphasis of a second literature chapter will be specific theoretical framework/s relevant to the research and possible (proposed) methodologies applicable to your research problem. Theoretical projects should indicate ‘how’ students did/plan to do their theoretical analysis. E.g. how/why were particular frameworks chosen, what criteria was used to select them, what criteria was used to analyse them (contributing to the critical analysis across frameworks), how did literature inform these criteria, etc. This could be a brief chapter on its own or an introductory section within a theoretical framework analysis chapter. 3.2 Research design For empirical projects the following should be addressed in the methodology chapter (they could also be specific headings or sections): Research paradigm or orientation to knowledge (e.g. Interpretivism, Design Science Research, Positivism, etc.) Methodological approach/strategy (e.g. Case Study research, Surveys, Action research, etc.) Data that will be collected (this should relate to the conceptual framework and literature from previous chapters) Sources of data and participants (who are the participants from whom you are going to get data from and why are they the most appropriate for doing so?) Data collection method (e.g. interviews, questionnaires, observation, measurement, etc.) o Field procedures (what happens up to and before you start collecting data? See Appendix A) 12 Compiled by KEM Krauss © Rhodes University 2014 o Data collection instrument (Interview questions, questionnaire, etc. See Appendix B for an example of an interview guide, where the authors show how interview questions align with the research objectives) Data treatment (or data analysis) Research bias and limitations Each research design has a particular approach and emphasis. It is important to offer a detailed explanation of your methodological approach according to what is necessary for your chosen method. To do qualitative research, for example, Myers (2009) suggests that the research design involves deciding on the researcher’s philosophical assumptions, the research method, collection and treatment of data, and approach for writing up and presenting results. Denzin and Lincoln (2005: 376) argue that qualitative research should answer five basic questions: 1. How will the design connect to the paradigm or perspective being used? I.e. how will the chosen methodology align with the ontology and epistemology of the research paradigm? 2. How will the methodology allow the researcher to address the problems of praxis (putting theory into practice) and change? 3. Who or what will be studied? 4. What strategies of enquiry will be used? 5. What methods and research tools for collecting and analysing empirical data will be utilised? Find the criteria relevant to your chosen methodology and demonstrate to the examiner that you have been rigorously and adequately doing that. 3.3 Ethical clearance procedures All research instruments (e.g. Interview guides and Questionnaires) must be submitted to the appropriate Ethical Standards committee. The research protocol for the Department of Information Systems is: Complete the ethical clearance forms at http://www.ru.ac.za/facultyofcommerce/intranet/research/. The following needs to be in order and attached to your application: o Research instruments (e.g. questionnaires, interview questions, etc.) 13 Compiled by KEM Krauss © Rhodes University 2014 o Informed consent form to be used o Written information to be given to participants prior to participation (e.g. invitation to participate) o Institutional permissions if applicable Ethical clearance applications should be submitted to the Departmental Manager (Caro Watkins). Once it is approved, the Departmental Manager will email the student and supervisor and give them the go ahead. If there are other issues, it may need to go further to the faculty or Rhodes ethics committee; students may have to wait for this approval. A note on applying for ethical clearance: Any involvement of students who are not registered in the IS Department, requires the approval of the Dean of Students. If the research is carried out in the public areas of the university, the permission of the Registrar is required, and if staff outside the IS Department are involved, then the approval of the Registrar or the Director: Human Resources is required. 3.4 Conclusions 14 Compiled by KEM Krauss © Rhodes University 2014 CHAPTER 4 Data analysis and results 4.1 Introduction The purpose of the data analysis and results chapter/s is to explain how the research methodology was carried out. So typically you will start the section as follows: “This chapter describes how the methodological approach described in the previous chapter was carried out and how data was analysed. …” For PhD and Masters students a descriptions of findings and results may constitute several chapters. The introduction to each chapter should highlight the link with the research questions/goals/purpose. For theoretical projects, this section could consist of an analysis of each framework, and then a cross analysis or critical review. Also, read Chapter 2 and 3 of this template. 4.2 Writing style Generally, up to this point, the description of your research methodology is in the future tense, e.g. “the researcher will…”; “data will be analysed using …”; “participants will be selected from …”; etc. From this point onwards, you write from the position of “my research methodology has been carried out and I have completed my data analysis”. Therefore, you typically write in the past tense: e.g. “The researcher had to rely on existing contacts in the web design community to introduce possible web designers as interviewees”; “The case study interviews were a time consuming (in some cases almost 2 hours) and extensive process”; “In Figures 5.1 a list of themes raised by the case study informants and frequencies are shown”, and so on. 4.3 Structure It is very difficult to suggest a specific chapter structure for findings and results. Every research project and approach is unique. Therefore, the way in which you structure your results chapter should be based on consensus between you and your supervisor. 4.4 Methodological rigour and self-assessment A review of literature always includes a study of a proposed methodology appropriate for addressing the problem situation. You have to therefore find criteria for self-assessing your research. For example, ask yourself; “How do I know that I have carried out my methodology 15 Compiled by KEM Krauss © Rhodes University 2014 rigorously and correctly?”; “What best practices have I identified from readings on my chosen method?”; “How do I know that I have collected the right data and enough data to answer my research questions”; “How do I know that I asked the right questions in my online questionnaire?”; “How do I know that I have a new and adequate contribution to knowledge (for PhDs especially)?”; “How can I persuade my examiners that I have contributed to knowledge, that I have carried out my research rigorously and correctly, and that I have relevant findings?”; and so forth. 4.5 Conclusions In this section you could also briefly show the link with questions/goals/problems and how the results answer these. CHAPTER (n) Conclusions and contributions 5.1 Introduction The final chapter brings everything together. It is where you articulate your research contribution, and provide recommendations and directions for future work. As before, you should note that the headings here are suggested headings, and not required headings. About thesis length: For a PhD and full-dissertation Masters; between 150 and 250 pages. (It is also a skill to be able to say what you have to say in a minimum number of words!) For Honours projects: 40 to 60 pages. 5.2 Summary of the thesis Start off by giving a summary of the thesis/dissertation. Relate the reader back to specific chapters, sections, and places where you contribute. Revisit and highlight your golden research thread. 16 Compiled by KEM Krauss © Rhodes University 2014 5.3 How the research questions were answered This section should show explicitly how your research questions were answered. In some cases it might feel like repetition, but it is necessary to bring everything together for the reader. (Examiners often read the first and last chapters of a thesis first, before digging into the details!) 5.4 Key contributions Provide a section that highlights specific key contributions (see Section 2.5). A very persuasive way to emphasis the relevance of your contribution is to summarise your selfassessment criteria and provide evidence of your achieving it with your research (Section 4.4). Read Webber (2009) on Rigour, Relevance, and Rhetoric. 5.5 Recommendations and Limitations Based on your contributions and answers to your research questions, you should put forward recommendations and suggestions for practitioners and academia. Revisit your research limitations and link it back to the recommendations. Normally a limitation is an opportunity for future work! 17 Compiled by KEM Krauss © Rhodes University 2014 References (see Section 2.5 for the Harvard referencing style) Alvesson, M. and Sandberg, J. 2013. Constructing Research Questions: Doing Interesting Research. Sage Publication. Brown, I. and Roode, J.D. 2004. Using grounded theory in the analysis of literature: The case of Strategic Information Systems planning. In ACIS 2004 Proceedings. Chen, WenShin and Hirschheim, Rudy. 2004. A paradigmatic and methodological examination of information systems research from 1991 to 2001. Information Systems Journal 14, 197–235. De Kock, L. and Levey, D. n.d. The Master’s Dissertation and the Doctoral Thesis: A Guide to Research and the Organization. Available online at http://www.unisa.ac.za/contents/courses/postgrad/docs/emasters.pdf. Denzin, N.K. and Lincoln, Y.S., 2005. The SAGE Handbook of Qualitative Research. Thousand Oaks: Sage Publications. Fourie, I. & Krauss, K. 2011. Information literacy training for teachers in rural South Africa. Journal of Systems and Information Technology (JoSIT), 13(3):303-321. ISSN: 1328-7265. Hofstee, E. 2006. Constructing a Good Dissertation: A Practical Guide to Finishing a Masters, MBA or PhD on Schedule. South Africa: EPE. Joost F Wolfswinkel, Elfi Furtmueller and Celeste P M Wilderom. 2013. Using grounded theory as a method for rigorously reviewing literature. European Journal of Information Systems 22, 45-55 (January 2013) | doi:10.1057/ejis.2011.51. Krauss, K. 2007. Visual Aesthetics and its Impact on Online Communication Intent. Master of Commerce. University of KwaZulu-Natal. Lubbe, Sam. 1998. IT Investment in Developing Countries: An Assessment and Practical Guideline. London: Idea Group Publishing. Mingers, J. 2003. The paucity of multimethod research: A review of the information systems literature. Information Systems Journal, 13, 233–249. Mthoko, H.L.W.T. and Pade-Khene, C. 2013. Towards a theoretical framework on ethical practice in ICT4D programmes. Information Development, 29(1), pp. 36-53. Myers, M.D., 2009. Qualitative research in Business and Management. London: SAGE. Roode, J.D., 1993. Implications for teaching of a process-based research framework for information systems. In: SMITH, L., ed. Proceedings of the 8th Annual Conference of the 18 Compiled by KEM Krauss © Rhodes University 2014 International Academy for Information Management, Orlando, Florida. 3-5 December 1993, Georgia Southern University, pp. 61-78. Shih, M., Feng. J. and Tsai, C-C. 2007. Research and trends in the field of e-learning from 2001 to 2005: A content analysis of cognitive studies in selected journals. Computers and Education (2007), doi:10.1016/j.compedu.2007.10.004. Sidorova, A., Evangelopoulos, N., Valacich, J.S. and Ramakrishnan, T. 2008. Uncovering the intellectual core of the information systems discipline. MIS Quarterly Vol. 32 No. 3, pp. 467482. Van Der Schyff, K. and Krauss, K.E.M. Higher Education cloud computing in South Africa: Towards understanding trust and adoption issues. Accepted for the South African Computer Journal (SACJ). Weber, R., 2009. Research on ICT for development: some reflections on rhetoric, rigor, reality and relevance. In: Proceedings of the 3rd International IDIA Development Informatics Conference. 28-30 October 2009, pp. 28-30. Webster, J. and Watson, R.T. 2002. Analyzing for the past to prepare for the future: Writing a literature review. MIS Quarterly 26(2): pp. xiii – xxiii 19 Compiled by KEM Krauss © Rhodes University 2014 Appendices Appendix A – Field procedures (example from Lubbe, 1998, cited in Krauss, 2007) 1. Using the gatekeeper as reference, contact all possible web and graphic designers working in the company environment. Find at least three willing and able participants for each case study. 2. Make initial contact with the company at the highest level possible in order to get consent for conducting the interviews and using responses for research purposes. 3. Schedule a convenient interview time in a relaxed and quiet setting. Ensure that enough time is available should the discussions lead to that. 4. Each interview will commence with a brief introduction of the intentions of the research, explaining the type of questions that will be presented and why the interviewee is selected. 5. The interviewee will be informed that the interview is recorded and will be given the reassurance that the intention of the investigator is not to enquire about company specific, financial or private information. Make sure that the interviewee understands that they are at liberty to withdraw from the project at any time, should they so desire. Their responses will be treated as private and confidential. 6. Ensure that the interviewee do not have a problem with being recorded. 7. Ensure that interviewees do not discuss interview content with other possible participants so as to avoid bias as far as possible. 8. During the interview ensure as far as possible that the interviewee is at ease at all times. 9. During the interview take care that the investigator’s body language and other possible cues do not influence the interviewee’s thinking or responses. 10. In an effort to minimise subjective bias the same general open-ended questions should be presented to interviewees in similar order. 20 Compiled by KEM Krauss © Rhodes University 2014 Appendix B – Example of an Interview guide In the example from Van Der Schyff and Krauss (2014), each interview question and the purpose each question is given. The second column shows how the interview questions relate to the study objectives and the research questions. Interview question How do you view the benefits that cloud computing offers your university, taking into consideration the additional threats and potential security incidents it could expose your university to? Some individuals have described cloud computing as a security nightmare, so much so that it can't be handled in traditional ways. In your opinion, how does the openness of most university networks affect threat mitigation techniques and/or technologies within a university cloud infrastructure? In your university what role do you think cloud computing threats play with regard to cloud information security, specifically the confidentiality, integrity and availability of information? How does your university currently respond to security incidents? How do you think the transparency of cloud provider operations would influence the cloud adoption process within your university? In your opinion, what are the major cloud adoption stumbling blocks in your institution? Purpose of the question This question aims to understand how university stakeholders view this issue and whether or not they agree that it can enhance the services they offer their students. It enquires into whether or not they deem a move towards the cloud as beneficial to their day to day running (administratively) of the university. In a survey conducted by Appirio [refError! Reference source not found.], 28% of cloud adopters cite security as the biggest misconception with regard to cloud adoption, which may or may not be echoed by key stakeholders within higher education. Additionally authors such as Erenben [ref] state that the use of the cloud could enhance security, thus forming part of the benefits of cloud computing. The purpose of this question is to find out if key stakeholders think threat mitigation can be applied in traditional ways, or whether the cloud indeed require special treatment with regard to threat mitigation and information security. In essence this question investigates the participant’s views on the traditional way of dealing with threats that compromise information security and whether or not this is applicable to the cloud. For example, the Ponemon Institute found that IT practitioners don’t believe that their organization is capable of securing data and applications within the cloud [ref]. Responses to this question might confirm that universities also fall into this category. The purpose of this question is to understand how the participant thinks about cloud computing threats and the relationship between these threats and information security. Do their views align with literature and to which extent? Also, do participants attach as much importance to threats and the management thereof, as the participants of the study conducted by the Data Security Council of India [ref]. Responses to this question might also uncover additional concerns over and above the others mentioned, fostering further conversation around this theme. The Cloud Security Alliance [ref], the SANS Institute (derived from SysAdmin, Audit, Networking, and Security) [ref] as well as Grobauer and Schreck [ref] mention that both the cloud provider and customer should be in agreement as to how security incidents in the cloud should be handled and who will be responsible for which aspect of the security incident response process. The purpose here is to ascertain whether or not key stakeholders do indeed share this point of view and to what extent. It also endeavours to uncover whether or not South African universities do have security incident response plans in place. If they do, a comparison could be made with what is suggested by the authors in the literature mentioned above. From a higher education perspective there may be additional factors to consider. The purpose of this question is to understand whether or not participants from institutions of higher education view and perceive cloud provider transparency as a good method for accelerating cloud adoption or not. This question is also aimed at probing their views on the adoption process, but it is equally applicable to security incident response as well as threats and threat mitigation. In essence this question sets out to investigate whether or not transparency in terms of threat mitigation, threats (realised or unrealised), breaches, and security incident responses are of concern to universities and how it ultimately affects the adoption process itself. Authors cite security as one of the top adoption stumbling blocks [refs]. This question aims to find out if the participant agrees with these findings and whether there other more prominent adoption stumbling blocks from a higher education perspective. Responses to this question might also afford the researchers the opportunity to obtain a deep understanding of all the concerns that affect adoption within South African universities. 21