SlideShare a Scribd company logo
Ethnography, Grounded Theory and Systems Analysis Presented by Lyndsey Shaeffer Information Technology IAKM 60005 Spring 2005 Michael Sutton, Instructor
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Systems Development Life Cycle (Source: p 635, Turban et al)
Systems Analysis ,[object Object],(Source: p 636, Turban et al)
Ethnography ,[object Object],(Source: p17, Kearney)
Grounded Theory (GT) ,[object Object],(Source: p. 210 Goede and de Villiers)
Benefits of Grounded Theory  ,[object Object],[object Object],[object Object],(Source: Berlin)
Benefits of Grounded Theory ,[object Object],[object Object],[object Object],(Source: Berlin)
Creation of a Grounded Theory ,[object Object],[object Object],[object Object],[object Object],[object Object],(Source: p 237, Glaser and Strauss)
Sources of Data ,[object Object],[object Object],[object Object],[object Object],[object Object],(Source: McIntosh)
QSR Nvivo ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document and Coding Bar
Nvivo Node Browser
Cumulative Coding in Nvivo
Case Study- Image Search ,[object Object],[object Object],[object Object],(Source: p 47, Cunningham et al)
Case Study- Image Search (Source: p 48, Cunningham et al)
Case Study- Image Search (Source: p 48, Cunningham et al)
Case Study- Designing for the RV Tribe ,[object Object],[object Object],[object Object],[object Object],(Source: p 5, Squires and Byrne)
Case Study- Designing for the RV Tribe ,[object Object],[object Object],[object Object],(Source: p 5, Squires and Byrne)
Benefits to Using a GT approach in Systems Analysis ,[object Object],[object Object],[object Object],[object Object]
Possible Problems When Using Grounded Theory ,[object Object],[object Object],[object Object],[object Object],(Source: Selden)
Sources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Grounded theory research
Grounded theory researchGrounded theory research
Grounded theory research
Dr. Hina Kaynat
 
Grounded theory
Grounded theoryGrounded theory
Grounded theory
Umme Habiba
 
Grounded Theory Method - Muller
Grounded Theory Method - MullerGrounded Theory Method - Muller
Grounded Theory Method - Muller
Michael Muller
 
Grounded theory research method
Grounded theory   research methodGrounded theory   research method
Grounded theory research methodMarie Faith Cayas
 
CONTENT ANALYSIS AND GROUNDED THEORY
CONTENT ANALYSIS AND GROUNDED THEORYCONTENT ANALYSIS AND GROUNDED THEORY
CONTENT ANALYSIS AND GROUNDED THEORY
irene sagadrata
 
Grounded theory tropf
Grounded theory tropfGrounded theory tropf
Grounded theory tropf
opeeeck
 
What is grounded_theory.ppt.4-24-08.ss
What is grounded_theory.ppt.4-24-08.ssWhat is grounded_theory.ppt.4-24-08.ss
What is grounded_theory.ppt.4-24-08.ssDenise Fezzi
 
Grounded Theory
Grounded TheoryGrounded Theory
Grounded Theory
guest7f1ad678
 
Ou leverhulme gt
Ou leverhulme gtOu leverhulme gt
Ou leverhulme gt
Anne Adams
 
Grounded theory
Grounded theoryGrounded theory
Grounded theory
Rebaz Ameen
 
Nurs 508 ass i, pls grounded theory
Nurs 508 ass i, pls grounded theoryNurs 508 ass i, pls grounded theory
Nurs 508 ass i, pls grounded theoryJJ Bellcote
 
Grounded Theory and the Constant Comparative Method
Grounded Theory and the Constant Comparative MethodGrounded Theory and the Constant Comparative Method
Grounded Theory and the Constant Comparative Method
Sharon M. Kolb, PhD
 
Grounded theory
Grounded theoryGrounded theory
Grounded theory
Norhidayah Badrul Hisham
 
Ethnographic & Grounded Theory
Ethnographic & Grounded TheoryEthnographic & Grounded Theory
Ethnographic & Grounded Theory
Phạm Phúc Khánh Minh
 
Grounded Theory: an Introduction (updated Jan 2011)
Grounded Theory: an Introduction (updated Jan 2011)Grounded Theory: an Introduction (updated Jan 2011)
Grounded Theory: an Introduction (updated Jan 2011)
Hora Tjitra
 

What's hot (17)

Grounded theory research
Grounded theory researchGrounded theory research
Grounded theory research
 
Grounded theory
Grounded theoryGrounded theory
Grounded theory
 
Grounded Theory Method - Muller
Grounded Theory Method - MullerGrounded Theory Method - Muller
Grounded Theory Method - Muller
 
Grounded theory
Grounded theoryGrounded theory
Grounded theory
 
Grounded theory research method
Grounded theory   research methodGrounded theory   research method
Grounded theory research method
 
CONTENT ANALYSIS AND GROUNDED THEORY
CONTENT ANALYSIS AND GROUNDED THEORYCONTENT ANALYSIS AND GROUNDED THEORY
CONTENT ANALYSIS AND GROUNDED THEORY
 
Grounded theory tropf
Grounded theory tropfGrounded theory tropf
Grounded theory tropf
 
What is grounded_theory.ppt.4-24-08.ss
What is grounded_theory.ppt.4-24-08.ssWhat is grounded_theory.ppt.4-24-08.ss
What is grounded_theory.ppt.4-24-08.ss
 
Grounded Theory
Grounded TheoryGrounded Theory
Grounded Theory
 
Ou leverhulme gt
Ou leverhulme gtOu leverhulme gt
Ou leverhulme gt
 
Grounded theory
Grounded theoryGrounded theory
Grounded theory
 
Nurs 508 ass i, pls grounded theory
Nurs 508 ass i, pls grounded theoryNurs 508 ass i, pls grounded theory
Nurs 508 ass i, pls grounded theory
 
Grounded Theory and the Constant Comparative Method
Grounded Theory and the Constant Comparative MethodGrounded Theory and the Constant Comparative Method
Grounded Theory and the Constant Comparative Method
 
Grounded theory new
Grounded theory newGrounded theory new
Grounded theory new
 
Grounded theory
Grounded theoryGrounded theory
Grounded theory
 
Ethnographic & Grounded Theory
Ethnographic & Grounded TheoryEthnographic & Grounded Theory
Ethnographic & Grounded Theory
 
Grounded Theory: an Introduction (updated Jan 2011)
Grounded Theory: an Introduction (updated Jan 2011)Grounded Theory: an Introduction (updated Jan 2011)
Grounded Theory: an Introduction (updated Jan 2011)
 

Similar to Ethnography, Grounded Theory and Systems Analysis

Grounded theory methodology of qualitative data analysis
Grounded theory methodology of qualitative data analysisGrounded theory methodology of qualitative data analysis
Grounded theory methodology of qualitative data analysis
Dr. Shiv S Tripathi
 
METHODS FOR RESEARCH
METHODS FOR RESEARCHMETHODS FOR RESEARCH
METHODS FOR RESEARCHITC Limited
 
Case study jackeline oviedo
Case study   jackeline oviedoCase study   jackeline oviedo
Case study jackeline oviedo
katerinegomezj
 
Case study jackeline oviedo
Case study   jackeline oviedoCase study   jackeline oviedo
Case study jackeline oviedokaterinegomezj
 
Grounded Theory
Grounded TheoryGrounded Theory
Grounded Theory
Gautam Kumar
 
INTRO2.ppt
INTRO2.pptINTRO2.ppt
INTRO2.ppt
narman1402
 
Rmethod sample
Rmethod sampleRmethod sample
Rmethod sample
razalibmuda
 
Rmethod
RmethodRmethod
Rmethod
Vineet Gupta
 
Content Analysis Overview for Persona Development
Content Analysis Overview for Persona DevelopmentContent Analysis Overview for Persona Development
Content Analysis Overview for Persona Development
Pamela Rutledge
 
Research design and methodology
Research design and methodologyResearch design and methodology
Research design and methodology
Palitha Edirisingha
 
Learning Relations from Social Tagging Data
Learning Relations from Social Tagging DataLearning Relations from Social Tagging Data
Learning Relations from Social Tagging Data
Hang Dong
 
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
Amy Isleb
 
5 qualitative methodology (Dr Mai, 2014)
5   qualitative methodology (Dr Mai, 2014)5   qualitative methodology (Dr Mai, 2014)
5 qualitative methodology (Dr Mai, 2014)
Phong Đá
 
11 - qualitative research data analysis ( Dr. Abdullah Al-Beraidi - Dr. Ibrah...
11 - qualitative research data analysis ( Dr. Abdullah Al-Beraidi - Dr. Ibrah...11 - qualitative research data analysis ( Dr. Abdullah Al-Beraidi - Dr. Ibrah...
11 - qualitative research data analysis ( Dr. Abdullah Al-Beraidi - Dr. Ibrah...
Rasha
 
Information Skills For Researchers V3
Information Skills For Researchers V3Information Skills For Researchers V3
Information Skills For Researchers V3Jacqueline Thomas
 
Case study final
Case study finalCase study final
Case study final
hinanwr
 
D1802023136
D1802023136D1802023136
D1802023136
IOSR Journals
 

Similar to Ethnography, Grounded Theory and Systems Analysis (20)

Grounded theory methodology of qualitative data analysis
Grounded theory methodology of qualitative data analysisGrounded theory methodology of qualitative data analysis
Grounded theory methodology of qualitative data analysis
 
METHODS FOR RESEARCH
METHODS FOR RESEARCHMETHODS FOR RESEARCH
METHODS FOR RESEARCH
 
Case study jackeline oviedo
Case study   jackeline oviedoCase study   jackeline oviedo
Case study jackeline oviedo
 
Presentación pavel
Presentación  pavelPresentación  pavel
Presentación pavel
 
Case study jackeline oviedo
Case study   jackeline oviedoCase study   jackeline oviedo
Case study jackeline oviedo
 
Grounded Theory
Grounded TheoryGrounded Theory
Grounded Theory
 
INTRO2.ppt
INTRO2.pptINTRO2.ppt
INTRO2.ppt
 
Rmethod sample
Rmethod sampleRmethod sample
Rmethod sample
 
Rmethod
RmethodRmethod
Rmethod
 
Rmethod
RmethodRmethod
Rmethod
 
Content Analysis Overview for Persona Development
Content Analysis Overview for Persona DevelopmentContent Analysis Overview for Persona Development
Content Analysis Overview for Persona Development
 
Research design and methodology
Research design and methodologyResearch design and methodology
Research design and methodology
 
Learning Relations from Social Tagging Data
Learning Relations from Social Tagging DataLearning Relations from Social Tagging Data
Learning Relations from Social Tagging Data
 
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
27 LIMITATIONS AND OPPORTUNITIES OF SYSTEM DEVELOPMENT METHODS IN WEB INFORMA...
 
5 qualitative methodology (Dr Mai, 2014)
5   qualitative methodology (Dr Mai, 2014)5   qualitative methodology (Dr Mai, 2014)
5 qualitative methodology (Dr Mai, 2014)
 
43144 12
43144 1243144 12
43144 12
 
11 - qualitative research data analysis ( Dr. Abdullah Al-Beraidi - Dr. Ibrah...
11 - qualitative research data analysis ( Dr. Abdullah Al-Beraidi - Dr. Ibrah...11 - qualitative research data analysis ( Dr. Abdullah Al-Beraidi - Dr. Ibrah...
11 - qualitative research data analysis ( Dr. Abdullah Al-Beraidi - Dr. Ibrah...
 
Information Skills For Researchers V3
Information Skills For Researchers V3Information Skills For Researchers V3
Information Skills For Researchers V3
 
Case study final
Case study finalCase study final
Case study final
 
D1802023136
D1802023136D1802023136
D1802023136
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Ethnography, Grounded Theory and Systems Analysis