EXPLORING THE USE OF GROUNDED THEORY
AS A METHODOLOGICAL APPROACH TO
EXAMINE THE 'BLACK BOX' OF NETWORK
LEADERSHIP IN THE NATIONAL QUALITY
FORUM
A. BRYCE HOFLUND
University of Nebraska at Omaha
ABSTRACT
This paper describes how grounded theory was used to investigate the
“black box” of network leadership in the creation of the National
Quality Forum. Scholars are beginning to recognize the importance of
network organizations and are in the embryonic stages of collecting and
analyzing data about network leadership processes. Grounded theory,
with its focus on deriving theory from empirical data, offers researchers
a distinctive way of studying little-known phenomena and is therefore
well suited to exploring network leadership processes. Specifically, this
paper provides an overview of grounded theory, a discussion of the
appropriateness of grounded theory to investigating network
phenomena, a description of how the research was conducted, and a
discussion of the limitations and lessons learned from using this
approach.
Keywords: grounded theory, network leadership, health care, network
organization, collaboration
470 JHHSA SPRING 2013
It is a capital mistake to theorize
before one has the data.
- Sherlock Holmes
The task of scientific study is to lift the veils
that cover the area of life that one proposes to study.
-- Blumer
(1978)
Generating a theory involves a process of research.
--Glaser and
Strauss (1967)
In The Rise of the Network Society (2000), the first
in a trilogy of books about the social, economic, and
cultural impacts of the Information Age, sociologist
Manual Castells documents the rise of the Information Age.
A defining feature of this new age is interconnectedness,
which is manifested through the complex networks that are
a ubiquitous part of the Information Age. Networks are
everywhere; there are, among other things, global business
networks, cellular networks, television networks, social
networks, the Internet, and computer networks.
In the public sector we also are witnessing the
movement away from bureaucratic, hierarchical
organizations toward networks. Rubin (2005) argues that
the three-branch metaphor for government is outmoded and
that the network metaphor more accurately describes
government and intergovernmental relations today.
Goldsmith and Eggers (2004) note that this shift has
occurred for a number of reasons, including an increase in
cross-agency and cross-government initiatives, an increase
in public-private collaboration, and the growth of the
Digital Revolution, which allows for increased citizen
demand for and input in service delivery options.
JHHSA SPRING 2013 471
In 1999 the health care industry created the National
Quality Forum (NQF), a network organization, whose
founding mission was to improve American healthcare
through endorsement of consensus-based national standards
for measurement and public ...
About your research methodology grounded theory. rica viljoen. eskomDr Rica Viljoen
Presentation made at research workshop of the Da Vinci Institute hosted at Eskom Research Conference. A unique integration of grounded theory and systems thinking are presented.
About your research methodology grounded theory. rica viljoen. eskomDr Rica Viljoen
Presentation made at research workshop of the Da Vinci Institute hosted at Eskom Research Conference. A unique integration of grounded theory and systems thinking are presented.
The Case StudyMany disciplines use various forms of the ca.docxmamanda2
The Case Study
Many disciplines use various forms of the case study to examine an individual or phenomenon within a specified context. The approach and application of case study designs also can vary widely between various disciplines such as medicine, law, and the social sciences. However, in the social and behavioral sciences, case studies are often referred to as uncontrolled studies. Yin (2013) defined the case study as an empirical inquiry that investigates a phenomenon within its real-world context, when the boundaries between phenomena and context are not clearly evident, in which multiple data sources are used. Yin referred to the case study as a “method” as opposed to confining it to only an approach or a “tradition” within the various forms of qualitative research (e.g., Creswell, 2012). Generally, the focus of the case study is on developing a narrative or revealing a phenomenon based on an in-depth, real-time, or retrospective analysis of a case. Therefore, issues related to experimental control and internal validity are nonfactors within this approach. Although case studies do not infer causation and the results should not be generalized, the findings can provide rich insight toward phenomena and serve as support for theories and the generation of hypotheses. However, if desired, Yin does offer approaches and models for researchers interested in attempting to infer causation from case study designs (which differs from QCA analysis).
The emphasis in a case study is primarily the qualitative method; however, cross sections of quantitative data are usually collected as supplementary data throughout the analyses (see mixed method embedded case study design). The label of case study is often applied to many social science examinations as a catchall term, many times misapplying the concept (Malcolm, 2010). However, the case study design can be applied to any of the approaches within the qualitative method, such as the most commonly applied narrative and phenomenological approach in psychology (Singer & Bonalume, 2010a) or the ethnographic approach in education (Creswell, 2014). Creswell took a different angle than Yin (2013) regarding the type and description of designs for the case study. Gall, Gall, and Borg (2007) succinctly described a case study “as (a) the in-depth study of (b) one or more instances of a phenomenon (c) in its real-life context that (d) reflects the perspective of the participants involved in the phenomenon” (p. 447).
Confusion does arise when authors use different terminology for similar constructs. These semantic differences can be seen in the work of Yin, who uniquely defined and applied the terms holistic and embedded (see Appendix B) differently than their traditional uses; for example, the term embedded has an entirely different meaning when used by Creswell. Another example of this is the term case study design, used within the qualitative method and most often associated with the ethnographic and phenomeno.
The Case StudyMany disciplines use various forms of the ca.docxarnoldmeredith47041
The Case Study
Many disciplines use various forms of the case study to examine an individual or phenomenon within a specified context. The approach and application of case study designs also can vary widely between various disciplines such as medicine, law, and the social sciences. However, in the social and behavioral sciences, case studies are often referred to as uncontrolled studies. Yin (2013) defined the case study as an empirical inquiry that investigates a phenomenon within its real-world context, when the boundaries between phenomena and context are not clearly evident, in which multiple data sources are used. Yin referred to the case study as a “method” as opposed to confining it to only an approach or a “tradition” within the various forms of qualitative research (e.g., Creswell, 2012). Generally, the focus of the case study is on developing a narrative or revealing a phenomenon based on an in-depth, real-time, or retrospective analysis of a case. Therefore, issues related to experimental control and internal validity are nonfactors within this approach. Although case studies do not infer causation and the results should not be generalized, the findings can provide rich insight toward phenomena and serve as support for theories and the generation of hypotheses. However, if desired, Yin does offer approaches and models for researchers interested in attempting to infer causation from case study designs (which differs from QCA analysis).
The emphasis in a case study is primarily the qualitative method; however, cross sections of quantitative data are usually collected as supplementary data throughout the analyses (see mixed method embedded case study design). The label of case study is often applied to many social science examinations as a catchall term, many times misapplying the concept (Malcolm, 2010). However, the case study design can be applied to any of the approaches within the qualitative method, such as the most commonly applied narrative and phenomenological approach in psychology (Singer & Bonalume, 2010a) or the ethnographic approach in education (Creswell, 2014). Creswell took a different angle than Yin (2013) regarding the type and description of designs for the case study. Gall, Gall, and Borg (2007) succinctly described a case study “as (a) the in-depth study of (b) one or more instances of a phenomenon (c) in its real-life context that (d) reflects the perspective of the participants involved in the phenomenon” (p. 447).
Confusion does arise when authors use different terminology for similar constructs. These semantic differences can be seen in the work of Yin, who uniquely defined and applied the terms holistic and embedded (see Appendix B) differently than their traditional uses; for example, the term embedded has an entirely different meaning when used by Creswell. Another example of this is the term case study design, used within the qualitative method and most often associated with the ethnographic and phenomeno.
PSY-850 Lecture 5Objectives Appraise the suitability of groun.docxamrit47
PSY-850 Lecture 5
Objectives:
Appraise the suitability of grounded theory and narrative inquiry.
Contrast data collection, triangulation, and analysis methods employed in grounded theory and narrative inquiry.
Approaches to Qualitative Research: Grounded Theory and Narrative Inquiry
Introduction
Grounded theory is an overarching method not limited to qualitative variables. Its purpose is to develop new theory about the topic of study that is deeply grounded in facts of the setting studied. Those facts are taken directly from writings, interviews, participant-observation, artifacts, and the daily activities of members in the setting studied. Grounded theory's cofounders are Barney Glaser and Anselm Strauss (1967).
Narrative inquiry has a narrower scope because it concerns strictly narrative events and not writings, interview responses, artifacts, or participant observations other than participation in a narrative. Its origin is less well-defined than grounded theory. Riessman (2001, 2005) is one of the prominent contemporary theorists of the method. The narrative approach can be applied within a grounded theory study, as can other qualitative methods. This method takes its data strictly from narrator-listener encounters conducted during a study. A narrative always involves a narrator, a listener, and the exchange of information. The exchange is not limited to the semantic content of the words and sentences spoken. An understanding of illocution (the effect of an utterance) is necessary, requiring study of the ordinary language philosophy of John Searle (Burkhardt, 1990) and his critics (Doerge, 2004).
Grounded Theory
Glaser and Strauss (1967) developed the grounded theory method while studying ill and dying patients at the University of California, San Francisco Medical Center. The grounded theory method seeks to conceptualize and form hypotheses about a situation and setting during the research process, without any preconceived ideas at the beginning.
What Glaser and Strauss were doing was called abduction, a logical process transcending induction and deduction, developed by the philosopher Charles Sanders Peirce (1901), and more recently elaborated in Josephson and Josephson (1996). Abduction is the development (using informal induction, deduction, and intuition) of pretheories that are worth further exploration. In human consciousness, the phenomenon of emergence is a product of prior abduction that may be conscious, unconscious, or both. Emergence is the idea of complex ideas or patterns resulting from a system that initially appears simple. Emergence was developed by the psychologist Lewes (1875), and has grown to widespread importance in general systems theory (von Bertalanffy, 1950), natural and social processes (Prigogine, 2000), and other scientific fields.
It is not clear if Strauss and Glaser were aware of Peirce as they developed their method, since Peirce was not then widely known in American intellectual circles. His work in man ...
Grounded theory define, types, explanation DolehKhan
Grounded theory is a research method concerned with the generation of
theory, which is grounded in data that has been systematically collected
and analyzed. It is used to uncover such things as social relationships and
behaviors of groups, known as social processes. It is a general
methodology for developing theory that is grounded in data which is
systematically gathered and analyzed.
Basically Grounded theory: It was developed in California, USA by Glaser and
Strauss during their study Awareness of Dying.
The following pairs of co-morbid disorders and a write 700 words .docxssuser454af01
The following pairs of co-morbid disorders and a write 700 words
based on your research:
Depression and substance abuse
Address
the following:
Discuss the general concept of co-morbidity.
Format
your paper consistent with APA guidelines.
.
The following is an access verification technique, listing several f.docxssuser454af01
The following is an access verification technique, listing several files and the access allowed for a single use.
Identify the control technique used here and for each,
explain the type of access allowed
.
a. File_1 R-E-
b. File_12 RWE
c. File_13 RW--
d. File_14 --E-
2.
. The following is an access verification technique, listing several users and the access allowed for File_13.
Identify the control technique used here and for each and
explain the type of access allowed.
Finally, describe who is included in the WORLD category.
a. User_10 --E-
b. User_14 RWED
c. User_17 RWE-
d. WORLD R---
.
More Related Content
Similar to EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
The Case StudyMany disciplines use various forms of the ca.docxmamanda2
The Case Study
Many disciplines use various forms of the case study to examine an individual or phenomenon within a specified context. The approach and application of case study designs also can vary widely between various disciplines such as medicine, law, and the social sciences. However, in the social and behavioral sciences, case studies are often referred to as uncontrolled studies. Yin (2013) defined the case study as an empirical inquiry that investigates a phenomenon within its real-world context, when the boundaries between phenomena and context are not clearly evident, in which multiple data sources are used. Yin referred to the case study as a “method” as opposed to confining it to only an approach or a “tradition” within the various forms of qualitative research (e.g., Creswell, 2012). Generally, the focus of the case study is on developing a narrative or revealing a phenomenon based on an in-depth, real-time, or retrospective analysis of a case. Therefore, issues related to experimental control and internal validity are nonfactors within this approach. Although case studies do not infer causation and the results should not be generalized, the findings can provide rich insight toward phenomena and serve as support for theories and the generation of hypotheses. However, if desired, Yin does offer approaches and models for researchers interested in attempting to infer causation from case study designs (which differs from QCA analysis).
The emphasis in a case study is primarily the qualitative method; however, cross sections of quantitative data are usually collected as supplementary data throughout the analyses (see mixed method embedded case study design). The label of case study is often applied to many social science examinations as a catchall term, many times misapplying the concept (Malcolm, 2010). However, the case study design can be applied to any of the approaches within the qualitative method, such as the most commonly applied narrative and phenomenological approach in psychology (Singer & Bonalume, 2010a) or the ethnographic approach in education (Creswell, 2014). Creswell took a different angle than Yin (2013) regarding the type and description of designs for the case study. Gall, Gall, and Borg (2007) succinctly described a case study “as (a) the in-depth study of (b) one or more instances of a phenomenon (c) in its real-life context that (d) reflects the perspective of the participants involved in the phenomenon” (p. 447).
Confusion does arise when authors use different terminology for similar constructs. These semantic differences can be seen in the work of Yin, who uniquely defined and applied the terms holistic and embedded (see Appendix B) differently than their traditional uses; for example, the term embedded has an entirely different meaning when used by Creswell. Another example of this is the term case study design, used within the qualitative method and most often associated with the ethnographic and phenomeno.
The Case StudyMany disciplines use various forms of the ca.docxarnoldmeredith47041
The Case Study
Many disciplines use various forms of the case study to examine an individual or phenomenon within a specified context. The approach and application of case study designs also can vary widely between various disciplines such as medicine, law, and the social sciences. However, in the social and behavioral sciences, case studies are often referred to as uncontrolled studies. Yin (2013) defined the case study as an empirical inquiry that investigates a phenomenon within its real-world context, when the boundaries between phenomena and context are not clearly evident, in which multiple data sources are used. Yin referred to the case study as a “method” as opposed to confining it to only an approach or a “tradition” within the various forms of qualitative research (e.g., Creswell, 2012). Generally, the focus of the case study is on developing a narrative or revealing a phenomenon based on an in-depth, real-time, or retrospective analysis of a case. Therefore, issues related to experimental control and internal validity are nonfactors within this approach. Although case studies do not infer causation and the results should not be generalized, the findings can provide rich insight toward phenomena and serve as support for theories and the generation of hypotheses. However, if desired, Yin does offer approaches and models for researchers interested in attempting to infer causation from case study designs (which differs from QCA analysis).
The emphasis in a case study is primarily the qualitative method; however, cross sections of quantitative data are usually collected as supplementary data throughout the analyses (see mixed method embedded case study design). The label of case study is often applied to many social science examinations as a catchall term, many times misapplying the concept (Malcolm, 2010). However, the case study design can be applied to any of the approaches within the qualitative method, such as the most commonly applied narrative and phenomenological approach in psychology (Singer & Bonalume, 2010a) or the ethnographic approach in education (Creswell, 2014). Creswell took a different angle than Yin (2013) regarding the type and description of designs for the case study. Gall, Gall, and Borg (2007) succinctly described a case study “as (a) the in-depth study of (b) one or more instances of a phenomenon (c) in its real-life context that (d) reflects the perspective of the participants involved in the phenomenon” (p. 447).
Confusion does arise when authors use different terminology for similar constructs. These semantic differences can be seen in the work of Yin, who uniquely defined and applied the terms holistic and embedded (see Appendix B) differently than their traditional uses; for example, the term embedded has an entirely different meaning when used by Creswell. Another example of this is the term case study design, used within the qualitative method and most often associated with the ethnographic and phenomeno.
PSY-850 Lecture 5Objectives Appraise the suitability of groun.docxamrit47
PSY-850 Lecture 5
Objectives:
Appraise the suitability of grounded theory and narrative inquiry.
Contrast data collection, triangulation, and analysis methods employed in grounded theory and narrative inquiry.
Approaches to Qualitative Research: Grounded Theory and Narrative Inquiry
Introduction
Grounded theory is an overarching method not limited to qualitative variables. Its purpose is to develop new theory about the topic of study that is deeply grounded in facts of the setting studied. Those facts are taken directly from writings, interviews, participant-observation, artifacts, and the daily activities of members in the setting studied. Grounded theory's cofounders are Barney Glaser and Anselm Strauss (1967).
Narrative inquiry has a narrower scope because it concerns strictly narrative events and not writings, interview responses, artifacts, or participant observations other than participation in a narrative. Its origin is less well-defined than grounded theory. Riessman (2001, 2005) is one of the prominent contemporary theorists of the method. The narrative approach can be applied within a grounded theory study, as can other qualitative methods. This method takes its data strictly from narrator-listener encounters conducted during a study. A narrative always involves a narrator, a listener, and the exchange of information. The exchange is not limited to the semantic content of the words and sentences spoken. An understanding of illocution (the effect of an utterance) is necessary, requiring study of the ordinary language philosophy of John Searle (Burkhardt, 1990) and his critics (Doerge, 2004).
Grounded Theory
Glaser and Strauss (1967) developed the grounded theory method while studying ill and dying patients at the University of California, San Francisco Medical Center. The grounded theory method seeks to conceptualize and form hypotheses about a situation and setting during the research process, without any preconceived ideas at the beginning.
What Glaser and Strauss were doing was called abduction, a logical process transcending induction and deduction, developed by the philosopher Charles Sanders Peirce (1901), and more recently elaborated in Josephson and Josephson (1996). Abduction is the development (using informal induction, deduction, and intuition) of pretheories that are worth further exploration. In human consciousness, the phenomenon of emergence is a product of prior abduction that may be conscious, unconscious, or both. Emergence is the idea of complex ideas or patterns resulting from a system that initially appears simple. Emergence was developed by the psychologist Lewes (1875), and has grown to widespread importance in general systems theory (von Bertalanffy, 1950), natural and social processes (Prigogine, 2000), and other scientific fields.
It is not clear if Strauss and Glaser were aware of Peirce as they developed their method, since Peirce was not then widely known in American intellectual circles. His work in man ...
Grounded theory define, types, explanation DolehKhan
Grounded theory is a research method concerned with the generation of
theory, which is grounded in data that has been systematically collected
and analyzed. It is used to uncover such things as social relationships and
behaviors of groups, known as social processes. It is a general
methodology for developing theory that is grounded in data which is
systematically gathered and analyzed.
Basically Grounded theory: It was developed in California, USA by Glaser and
Strauss during their study Awareness of Dying.
The following pairs of co-morbid disorders and a write 700 words .docxssuser454af01
The following pairs of co-morbid disorders and a write 700 words
based on your research:
Depression and substance abuse
Address
the following:
Discuss the general concept of co-morbidity.
Format
your paper consistent with APA guidelines.
.
The following is an access verification technique, listing several f.docxssuser454af01
The following is an access verification technique, listing several files and the access allowed for a single use.
Identify the control technique used here and for each,
explain the type of access allowed
.
a. File_1 R-E-
b. File_12 RWE
c. File_13 RW--
d. File_14 --E-
2.
. The following is an access verification technique, listing several users and the access allowed for File_13.
Identify the control technique used here and for each and
explain the type of access allowed.
Finally, describe who is included in the WORLD category.
a. User_10 --E-
b. User_14 RWED
c. User_17 RWE-
d. WORLD R---
.
The following discussion board post has to have a response. Please r.docxssuser454af01
The following discussion board post has to have a response. Please read the post and respond back according to the instructions attached below. Make sure to respond as instructed. Check attachment for response instruction and respond accordingly.
The instructions for the response to post is attached and highlighted.
The due date is Tuesday 5/10/2021 by 11:59 a.m. NO LATE WORK WILL BE ACCEPTED!
.
The following information has been taken from the ledger accounts of.docxssuser454af01
The following information has been taken from the ledger accounts of Isaac Stern Corporation
Total Income since incorporation$317,000
Total Cash Dividends pai d60,000
Total value of stock dividends distributed30,000
Gains on treasury stock transactions18,000
Unamortized discount of bonds payable32,000
Directions: Determine the current balance of retained earnings
.
The following attach files are my History Homewrok and Lecture Power.docxssuser454af01
The following attach files are my History Homewrok and Lecture Power Point. Please answer those questions by your own words and read the instructions carefully beofer you start writing.
Course Information:
In this course we will survey the history of technological developments from the Renaissance to the current day. We will focus on a series of technological objects—machines, tools, and systems—considering them in their broader historical (social, cultural, and political) contexts. Organized chronologically we will trace this history beginning with Leonardo Da Vinci and ending with the International Space Station. This is not, however, a teleological assessment, which assumes a progressive improvement of technology—each age has merits in its own rights.
.
The following is adapted from the work of Paul Martin Lester.In .docxssuser454af01
The following is adapted from the work of Paul Martin Lester.
In order to find meaning from a visual message, you need to learn a systematic way for studying images.
1.
Make an inventory list of every element in the image,
2.
Note the lighting used in the image,
3.
Note any eye contact by subjects in the image,
4.
Note the visual cues of color, form, depth, and movement,
5.
Note how the gestalt laws apply toward the composition of picture,
6.
Note any semiotic signs that are a part of the image's content, and
When you've gone through the six steps noted above, it's time to apply the six perspectives for visual analysis to the piece. Each perspective is noted below.
Personal Perspective - Gut Reaction
Rick Williams' Omniphasism (all in balance) or Personal Impact Analysis
1.
What is the picture's story?
2.
List primary words.
3.
List associative words.
4.
Select most significant associative words.
5.
Pair up primary & most significant associative words.
6.
Relate word pairs with your own feelings.
7.
Relate any inner symbolism.
8.
Write a brief story concerning personal insights.
Historical Perspective - The image's place in history
When do you think the image was made?
Is there a specific style that the image imitates?
Technical Perspective - Consider the process decisions
How was the image produced?
What techniques were employed?
Is the image of good quality?
Ethical Perspective - Moral Responsibility
Was the image maker socially responsible?
Has any person's rights been violated?
Are the needs of viewers met?
Is the picture aesthetically appealing?
Do the picture choices reflect moderation?
Is the image maker empathetic with the subject?
Can all the image choices be justified?
Does the visual message cause unjustified harm?
Cultural Perspective - Societal Impact
What is the story and the symbolism involved with the elements in the visual message?
What do they say about current cultural values?
Critical Perspective - Reasoned Opinion
What do I think of this image now that I've spent so much time looking and studying it?
Project Overview:
This week, you were introduced to six analytical perspectives for analyzing media. These perspectives form the foundation for your Media Analysis Project (MAP). Over the next three weeks, you will analyze a visual work from any media (print, film, television, Internet), of your own choosing.
Due Date:
June 5
Time Line:
·
Topic Assignment (Listed under Paper Topic)
·
June 5 Thesis and Outline (Listed in appropriate headings below)
·
June 5 Final Paper
NOTE: Thesis and Outline, and Final Paper are two separate documents.
Requirements:
Your analysis must encompass all six perspectives. This will be a detailed analysis consisting of 6-8 written pages. You must also use four credible academic sources in addition to the media itself. All sources must be cited in-text as well as on a reference page using standard APA format. Information on using .
The following article is related to deterring employee fraud within .docxssuser454af01
The following article is related to deterring employee fraud within organizations and answers some related questions. After reading the case, answer the following questions:
Read the article the following article:
Wells, J. T. (2004, December). Small business, big losses.
Journal of Accountancy,
198
(6), 42-47. Retrieved from Business Source Complete database.
Section:FRAUD
Audits and hotlines stack up as the bestcrime busters in a new ACFE study.
Occupational fraud has become--at least so far--the crime of the 21st century. It is a widespread phenomenon that affects practically every organization. The frauds in the 2004 Report to the Nation on Occupational Fraud and Abuse, from the Association of Certified Fraud Examiners, caused over $761 million in total losses, with a disproportionate percentage committed against small businesses--almost half of the frauds in the study took place in businesses with fewer than 100 employees. Not surprisingly such businesses are less likely to be audited or employ antifraud measures than the larger ones.
Several broad conclusions can be drawn from the 2004 report. First, though the losses have been stable over the years, the fact that in one year alone they are approaching $660 billion is cause for concern. Dishonest executives and employees are plying essentially the same schemes with the same results. Second, although large financial statement frauds receive the most attention, they are relatively uncommon compared to asset misappropriations and corruption. Third, small businesses remain the most vulnerable to occupational fraud because of three factors: They are the least likely to have an audit, a hotline or adequate internal controls. Fourth, audits--both internal and external--although excellent prevention devices are not the most effective means of detecting frauds. Fifth, hotlines and other reporting mechanisms are a vital part of any organization's prevention efforts but should go beyond employees to vendors and customers, too. Finally, occupational fraud cannot be eliminated but organizations that use both hotlines and auditors can greatly reduce these costly crimes.
Occupational fraud schemes can be as simple as pilferage of company supplies or as complex as sophisticated financial statement frauds. This article summarizes some of the key findings of certified fraud examiners (CFEs) in cases they investigated. Internal and external auditors and CPAs advising small business clients will learn of the most effective antifraud measures.
MEASURING THE COST OF FRAUD
Determining the true cost of occupational fraud is an impossible task. Because fraud is a crime based on concealment, organizations often do not know when they are being victimized. Many frauds never are detected or are caught only after they have gone on for several years. Many of those are never reported or prosecuted. In fact, there is no agency or organization that is specifically charged with gathering comprehensive fraud-relat.
The Five stages of ChangeBy Thursday, June 25, 2015, respond to .docxssuser454af01
The Five stages of Change
By Thursday, June 25, 2015, respond to the discussion.
Discussion Question
Anthony is a 27 year old heterosexual Caucasian male. He was arrested 2 weeks ago for his second DWI and is facing a license suspension. He works as a delivery driver for a local store and after disclosing the arrest to his employer, as well as the consequences including loss of his license, he was terminated.
Anthony lives with his girlfriend of 3 years and their 2 year old son. Anthony’s drinking behavior has increased to consumption of a case of beer on Saturday and Sunday evenings each week. He consumes several beers after work during the week “to maintain.” He has also been using methamphetamines, specifically “crystal meth” several times weekly. Anthony’s girlfriend ended their relationship as a result of his increasing substance use and ongoing difficulties. Anthony feels depressed and anxious about his current life situation, especially now that he realizes that he has no job and may be homeless because of his substance use. He is also feeling down about the loss of his relationship. He researched a few outpatient treatment programs to help him stop using both alcohol and methamphetamines, but is ambivalent about entering treatment. Anthony has considered the need to stop using substances to improve his life and relationships with significant others, though fears that he will lose his friends and miss partying with them if he stops. He also fears what life will be like without the comfort of getting high.
Consider and discuss the 5 stages of change. Based upon the information provided discuss what stage Anthony is in, and provide a rationale for your decision. Next, discuss the other stages of change and what indicators we might see as Anthony progresses on through these stages. Your posting must be a minimum of 500 words.
.
The first step in understanding the behaviors that are associated wi.docxssuser454af01
The first step in understanding the behaviors that are associated with mental disorders is to be able to differentiate the potential symptoms of a mental disorder from the everyday fluctuations or behaviors that we observe. Read the following brief case histories.
Case Study 1:
Bob is a very intelligent, 25-year-old member of a religious organization based on Buddhism. Bob’s working for this organization has caused considerable conflict between him and his parents, who are devout Baptists. Recently, Bob has experienced acute spells of nausea and fatigue that have prevented him from working and have forced him to return home to live with his parents. Various medical tests are being conducted, but as yet, no physical causes for his problems have been found.
Case Study 2:
Mary is a 30-year-old musician who is very dedicated and successful in her work as a teacher in a local high school and as a part-time member of local musical groups. Since her marriage five years ago, which ended in divorce after six months, she has dated very few men. She often worries about her time running out for establishing a good relationship with a man, getting married, and raising a family. Her friends tell her she gets way too anxious around men, and, in general, she needs to relax a little.
Case Study 3:
Jim was vice-president of the freshmen class at a local college and played on the school’s football team. Later that year, he dropped out of these activities and gradually became more and more withdrawn from friends and family. Neglecting to shave and shower, he began to look dirty and unhealthy. He spent most of his time alone in his room and sometimes complained to his parents that he heard voices in the curtains and in the closet. In his sophomore year, he dropped out of school entirely. With increasing anxiety and agitation, he began to worry that the Nazis were plotting to kill his family and kidnap him.
Case Study 4:
Larry, a 37-year-old gay man, has lived for three years with his partner, whom he met in graduate school. Larry works as a psychologist in a large hospital. Although competent in his work, he often feels strained by the pressures of his demanding position. An added source of tension on the job is his not being out with his co-workers, and, thus, he is not able to confide in anyone or talk about his private life. Most of his leisure activities are with good friends who are also part of the local gay community.
For each case, identify the individual's behaviors that seem to be problematic for the patient.
For each case study, explain from the biological, psychological, or socio-cultural perspective your decision-making process for identifying the behaviors that may or may not have been associated with the symptoms of a mental disorder.
Based on your course and text readings, provide an explanation why you would consider some of these cases to exhibit behaviors that may be associated with problems that occur in everyday life, while others could be as.
The first one is due Sep 24 at 1100AMthe French-born Mexican jo.docxssuser454af01
The first one is due Sep 24 at 11:00AM
the French-born Mexican journalist and author, Elena Poniatowska, will give a
public lecture
on the topic "
We Can All Be Writers" at
ASU
.
To receive the extra credit, you need to
attend the entire event and submits a short rhetorical analysis
(250 words):
identify one thing the speaker did well, and one thing she did not do well, in anticipating and reaching her target audience
https://ihr.asu.edu/news-events/events/we-can-all-be-writers-lecture-elena-poniatowska
___________________________________________________________________________
The second one is due Sept 25 at 11:00AM
the fiction writer and poet, Matt Bell, will
read from and discuss his work
at ASU
.
Anybody who
attends the entire event and submits a short report
(250 words)
and a personal reflection
(what did you learn? what was surprising? was there something you could relate to your
personal experience or writing?
- 500 words)
http://english.clas.asu.edu/mfareadingseries
.
The first part is a direct quote, copied word for word. Includ.docxssuser454af01
The
first part
is a
direct quote, copied word for word. Include the author's last name and the page number of the quote in parantheses. MLA format.
The
second part
of the journal entry, is
one paragraph that explains why you found the passage to be important
.
.
The final research paper should be no less than 15 pages and in APA .docxssuser454af01
The final research paper should be no less than 15 pages and in APA format. The 15 pages does not include the references/bibliography pages. You should also include visuals such as charts, pictures, or other media visuals to support and compliment your study. All papers will be submitted through eCourse and a link will be provided for submission
.
The first one Description Pick a physical activity. Somethi.docxssuser454af01
The first one
Description: Pick a
physical activity
. Something you do all the time, or something you’ve never done before: bike riding, running, swimming, hiking, golf, playing twister, roller skating, soccer, basketball, etc. Now go and spend at least twenty minutes participating in this activity. Really do it. Engage. Explore and experience it. Pay attention to every part of your body and mind as you play/do the activity. Even if you’ve done it all your life, engage with every nuance of the activity. What do your muscles do and feel like when doing the activity? What is challenging? What is smooth and easy? What sounds to you experience? smells? Tastes? Sights? Sensations? What about your mind? Where do your thoughts go as you perform the activity? Really pay attention and discover the experience of the activity. Perform it for at least twenty minutes, mindfully paying attention to every part of the experience. Experience and notice the details. Now go home. And write about what you experienced. Detail it. Tell me about what was hard, easy, unusual, fun, new? What did you feel, taste, smell, hear, see? Take me through it beat by beat, moment by moment, nuance by nuance.
The second one
Description: Go to a busy café or diner, or some other eatery, where you can sit near TWO other people, engaged in a conversation, a dynamic interesting conversation with tenstion… where something is happening between the two people… EAVES DROP on conversations – without being obvious. Find one that has something interesting going on. Anticipate spending at least 20-30 minutes listening in to this conversation.
From this conversation, listen carefully, pay attention to what is being said, what conflict is arising, what is expressed and revealed through the language. NOW, also pay attention to the people involved. What do they look like? What is their body language? Pay attention to all the details. Do not write anything at the busy café or diner. Just listen to what is said. Watch. Pay attention to all the details.
At a later time (when you get back home)
write a letter as if you are one of the people you observed in the café. Write the letter addressing the person that they were at the café with. This can be a love letter, a complaint, an email, an apology, an explanation, etc… For this exercise to work, you must have 1) chosen a conversation to listen to where something was HAPPENING and 2) you must really have spent the time, listening in on a conversation and paying attention to the dramatic tension… something between the two people must have been witnessed, heard, experienced, by YOU the writer. If not this letter will be flat, uninteresting, and lacking conflict. Write about something you heard or observed happening between the two people, but write about it as if you are one of the people in the conversation to the other. Write about some inherent need, conflict, obstacles. The letter can be a complaint, an apology, a .
The first column suggests traditional familyschool relationships an.docxssuser454af01
The first column suggests traditional family/school relationships and the second identifies a more collaborative approach. Provide an example of a situation (attendance, behavior problems, academic difficulties) that could arise at school and suggest how this issue may be resolved with a collaborative approach. Respond to at least two of your classmates’ postings.
.
The first president that I actually remembered was Jimmy Carter. .docxssuser454af01
The first president that I actually remembered was Jimmy Carter. I do remember as a child Ford being mentioned, but I was certainly not engaged in his presidency. However, I remember Reagan quite well. He came to office after a major financial down turn and his policies did seem to improve things immediately. Some have said that his actions of borrowing money were a hindrance to the future. Do you feel that Reganomics was beneficial to future generations or did he just borrow from the future in order to benefit his present circumstance? Did this set precedence for future presidents to take the nation into debt in order to help their political careers? I look forward to your thoughts?
.
The final project for this course is the creation of a conceptual mo.docxssuser454af01
The final project for this course is the creation of a conceptual model for an integrated afterschool childhood prevention, education, or intervention program (Boys and Girls Club, for example). The program serves a wide range of age groups (ages 4 through 17) and demographic backgrounds. Students should design a program that can appropriately address the needs of the various learners. This final project should include a program foundation, program description, research proposal, and self-reflection.
The final product represents an authentic demonstration of competency because it requires students to apply classic theory in order to compose an original program based on advanced developmental principles. The project is divided into
four milestones
, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in
Modules Three, Five, Seven, and Ten.
Main Elements
1.
Program Foundation:
a narrative/essay format that will describe the main concept of the program (prevention, education, intervention) and if the program will focus on a specific topic (math, English, drugs, bullying, coping skills for stress or anxiety, peer pressure, or your choice). This foundational narrative will provide citations that link the program concept to at least two of the classical theories presented in this course (Montessori, Piaget, Vygotsky, Bandura, Bronfenbrenner). (approximately 3–4 pages)
·
What type of program will be the focus of this project? Will it be a prevention program to stop kids from using alcohol and drugs? To try and prevent bullying? Will the program be an educational model, for example, a program focused on improving educational outcomes like math, critical thinking, problem solving, science, language skills, or other? Will the program be an intervention model or a program that targets kids for problematic behaviors like truancy, acting out in class, running away, vandalism, minor theft, or underage possession of alcohol or substances?
·
Consider the critical tasks of development as laid out by the chosen theory that may help organize the approaches utilized for each age group.
2.
Program Description
: This section will provide specific descriptions of the elements (tasks, materials, activities) for the each developmental level spanning the age ranges from 4 through 17. These levels should be consistent with at least one of the two classical theories proposed in your program foundation narrative. (approximately 3–4 pages)
·
In what setting will this program be offered, for example, school setting, community center, treatment center, or a faith-based organization?
·
How will your topic differ across each developmental level?
·
How will you describe the activities, materials, and tasks that will take place in the program for each age range?
·
Are the age ranges consistent with at least one of the classic theories employed to guide this.
The finance department of a large corporation has evaluated a possib.docxssuser454af01
The finance department of a large corporation has evaluated a possible capital project using the NPV method, the Payback Method, and the IRR method. The analysts are puzzled, since the NPV indicated rejection, but the IRR and Payback methods both indicated acceptance. Explain why this conflicting situation might occur and what conclusions the analyst should accept, indicating the shortcomings and the advantages of each method. Assuming the data is correct, which method will most likely provide the most accurate decisions and why?
.
The Final Paper must have depth of scholarship, originality, theoret.docxssuser454af01
The Final Paper must have depth of scholarship, originality, theoretical and conceptual framework, clarity and logic in its presentation and adhere to grammar guidelines. You will select a topic for your Final Paper related to the Future of Managed Health Care Delivery Systems, which will be submitted to your instructor for approval during Week Two. The 10-15 page paper (excluding title and reference pages) must follow APA guidelines for written assignments and contain eight to ten scholarly and/ or peer-reviewed sources, excluding the course textbook.
Your paper must address the following bolded topics, which should be titled appropriately in your paper:
Include an
Abstract
which is a synopsis of the overall paper.
Managed Health Care Quality
should address such factors as whether or not patient health care needs and even preferences are being met; the care is right for the illness, care is timely, and unnecessary test and procedures are not ordered.
Provider Contracting
is when doctors and health care practitioners have a contract agreement through a third party payer to accept a specified payment for services provided to patients.
Cost Containment
deals with managing the costs of doing business within a specified budget while restraining expenditures to meet a specified financial target.
Effects on Medicare and Medicaid
in managed health care appear to be moving in a direction where both types of recipients will be enrolled in some type of managed health care plan in the near future.
The Future Role of Government Regulations
, to include ERISA and HIPAA health care policies.
Include
Three Recommendations
each, related to quality and change in Medicare and Medicaid managed health care plans.
Writing the Final Paper
Must be ten- to fifteen double-spaced pages in length and formatted according to APA style as outlined in the Ashford Writing Center.
Must have a cover page that includes:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must include an introductory paragraph with a succinct thesis statement.
Must address the topic of the paper with critical thought.
Must end with a conclusion that reaffirms your thesis.
Must use at least eight scholarly and /or peer-reviewed sources, published within the last five years, including a minimum of three from the Ashford University Online Library.
Must document all sources in APA style, as outlined in the Ashford Writing Center.
Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center.
.
The Final exam primarily covers the areas of the hydrosphere, the bi.docxssuser454af01
The Final exam primarily covers the areas of the hydrosphere, the biosphere and the lithosphere. As in the Midterm, special attention should be paid to the lecture notes and the PowerPoint files, as well as the Discussion Boards. These sections are dependent on the text and the laboratory exercises, but the discussions and the lecture notes are more conducive to explanation and understanding with a essay-driven format. Additionally, the animated PowerPoints are good at achieving an understanding of processes that are in motion, especially when looking at the lithosphere, giving them more of a 3-dimensional quality.
For this final essay exam you are required to answer all five (5) of the questions. Although there is no set word limit for these essay questions, you will be graded on your knowledge of the material and the detail with which you write your answers. You should take care to cite your sources in APA format and provide full references in a Works Cited list.
Describe the paths of water through the hydrologic cycle. Explain the processes and the energy gains and losses involved in the changes of water between its 3 states. Operationally, we often most concerned with water does when it reaches the solid earth, both on the surface and in the sub-surface. Explain the relationship between the saturated zone, the water table, a ground water well and the cone of depression, all within the sub-surface.
The food chain is a valuable concept in biogeography. Give an example of a specific food chain, labeling the various levels of the food chain. After looking at characteristics of food chains, explain how a geographer’s approach to the study of organisms might be different than biologist’s study of organisms; what would each try to emphasize more than the other? What exactly is a biome? Compare/contrast the concept of the biome with that of the zoogeographic region. Compare/contrast the floral characteristics of 2 of the following biomes: Desert, Tundra, Midlatitude Grassland and Boreal Forest.
Theorize the difference in soil development in adjoining soils developed on forested, sloped area versus a grassed flat area. What are the soil-forming factors? Explain the importance of the nature of the parent material to soil formation and type. Then, cite at least 2 examples in which the influence of parent materials might be outweighed by other soil-forming factors. Explain the “struggle” between the internal and external processes in shaping the Earth’s surface. What are the different ways that the surface of the Earth is changed over time?
Describe the general sequence of events in continental drift since the time of 5 separate continents 450 million years ago. What is the difference between the older continental drift theory by Wegener and the more recent plate tectonic theory? Plate tectonics theory explains many seemingly unrelated phenomena. Explain how the patterns of volcanoes and earthquakes related to plate tectonics..
The Final Paper must be 8 pages (not including title and reference p.docxssuser454af01
The Final Paper must be 8 pages (not including title and reference pages) and should demonstrate an understanding of the reading assignments, class discussions, your own research, and the application of new knowledge. It must include citations and references for six to eight sources; one may be the text.
Micozzi, M. S. (2010). Fundamentals of complementary and alternative medicine. (4th ed.). St. Louis, MO: Saunders Elsevier.
At least four must be from the ProQuest, EBSCOhost, or PubMed Central databases in the University Library, and the remaining sources must be from other scholarly or professional Internet resources.
For the Final Paper,
Complementary and alternative medicines >> (
Natural Products)
Provide a brief discussion of the protocols, and provide details of historical events that shaped the practice.
Chronic Pain
Describe the disease or condition from the CAM perspective
Include potential cultural challenges faced by the afflicted patient population as well as the practitioner.
Describe how the CAM (Natural Products) practitioner diagnoses and treats the condition.
Identify potential questions or skepticisms other health care providers and potential clientele may have regarding the CAM selected, and address the questions, supporting your responses with a minimum of two sources of research for the health condition and system chosen.
Identify and substantively describe a minimum of two other CAM practice interventions that could be suggested to assist in minimizing the impact of the illness/condition. Justify implementation of the two interventions you are recommending.
Must begin with an introductory paragraph that has a succinct thesis statement.
Must address the topic of the paper with critical thought.
Must end with a restatement of the thesis and a conclusion paragraph.
Must utilize six to eight sources; one may be the text, at least four must be from the ProQuest, EBSCOhost, or PubMed Central databases, and the remaining sources must be from other scholarly or professional Internet resources.
Must document all sources in APA style.
Must include a separate reference page that is formatted according to APA style.
.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How libraries can support authors with open access requirements for UKRI fund...
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
1. EXPLORING THE USE OF GROUNDED THEORY
AS A METHODOLOGICAL APPROACH TO
EXAMINE THE 'BLACK BOX' OF NETWORK
LEADERSHIP IN THE NATIONAL QUALITY
FORUM
A. BRYCE HOFLUND
University of Nebraska at Omaha
ABSTRACT
This paper describes how grounded theory was used to
investigate the
“black box” of network leadership in the creation of the
National
Quality Forum. Scholars are beginning to recognize the
importance of
network organizations and are in the embryonic stages of
collecting and
analyzing data about network leadership processes. Grounded
theory,
with its focus on deriving theory from empirical data, offers
researchers
a distinctive way of studying little-known phenomena and is
therefore
well suited to exploring network leadership processes.
Specifically, this
2. paper provides an overview of grounded theory, a discussion of
the
appropriateness of grounded theory to investigating network
phenomena, a description of how the research was conducted,
and a
discussion of the limitations and lessons learned from using this
approach.
Keywords: grounded theory, network leadership, health care,
network
organization, collaboration
470 JHHSA SPRING 2013
It is a capital mistake to theorize
before one has the data.
- Sherlock Holmes
The task of scientific study is to lift the veils
that cover the area of life that one proposes to study.
-- Blumer
(1978)
Generating a theory involves a process of research.
--Glaser and
Strauss (1967)
3. In The Rise of the Network Society (2000), the first
in a trilogy of books about the social, economic, and
cultural impacts of the Information Age, sociologist
Manual Castells documents the rise of the Information Age.
A defining feature of this new age is interconnectedness,
which is manifested through the complex networks that are
a ubiquitous part of the Information Age. Networks are
everywhere; there are, among other things, global business
networks, cellular networks, television networks, social
networks, the Internet, and computer networks.
In the public sector we also are witnessing the
movement away from bureaucratic, hierarchical
organizations toward networks. Rubin (2005) argues that
the three-branch metaphor for government is outmoded and
that the network metaphor more accurately describes
government and intergovernmental relations today.
Goldsmith and Eggers (2004) note that this shift has
occurred for a number of reasons, including an increase in
cross-agency and cross-government initiatives, an increase
in public-private collaboration, and the growth of the
Digital Revolution, which allows for increased citizen
demand for and input in service delivery options.
JHHSA SPRING 2013 471
In 1999 the health care industry created the National
Quality Forum (NQF), a network organization, whose
founding mission was to improve American healthcare
through endorsement of consensus-based national standards
for measurement and public reporting of healthcare
4. performance data that provide meaningful information
about whether care is safe, timely, beneficial, patient-
centered, equitable and efficient.
The NQF was created because of all of the failed
attempts in health care to make some headway in quality
improvement. The NQF is representative of a network
organization because it was created to address issues of
health care quality in a new way by bringing together
organizations from the public and private sectors and
providing them with a forum to discuss and debate
measures of quality, and ultimately, to effect change. The
NQF thus represents a major administrative experiment in
addressing health policy issues.
Dr. Kenneth W. Kizer, as the NQF’s first leader,
was tasked with building the network. This makes network
leadership important. Since there were so few empirical
studies into the phenomenon of network leadership, a
grounded theory approach seemed to be the most
appropriate way to study the “black box” of network
leadership. The purpose of this paper is to provide some
insight into how to conduct an empirical study of network
leadership using a grounded theory approach and considers
some of the strengths, limitations, and lessons learned from
this application of grounded theory. I argue that grounded
theory offers a powerful and promising approach way of
studying such social phenomena as network leadership. It is
important to note that this paper does not present the
findings from this study of network leadership since they
have been published elsewhere (see Hoflund & Farquhar,
2008; Hoflund, 2012a, Hoflund, 2012b).
472 JHHSA SPRING 2013
5. This paper is organized into three sections. First, I
discuss the research design and strategy for this study,
including a brief overview of the history and nature of
grounded theory and its usefulness as an approach for
studying networks and leadership. Secondly, I discuss data
collection and data analysis. In Part Three, I conclude by
discussing some of the limitations and lessons I learned
from conducting research using a grounded theory
approach.
RESEARCH DESIGN
Since I was interested in exploring the phenomenon
of network leadership, I used a qualitative research design
and, more specifically, a grounded theory approach to
conduct this study about network leadership during a
network organization’s formative stages. A qualitative
research design is most appropriate for this study because it
provides the best means to explore complex processes and
investigate “little-known phenomena or innovative
systems” such as network leadership, and it is useful when
“relevant variables have yet to be identified” as is the case
with the critical tasks related to network leadership
(Marshall & Rossman, 1999, p. 57).
A qualitative approach also allows one to describe
the “naturally unfolding program processes and impacts”
and allows for a certain richness in the research—the
participants’ thoughts, opinions, and experiences are
captured in their own words—that one may not be able to
get through the use of another approach (Patton, 1987, p.
6. 14). That is, a qualitative approach allows one to “lift the
veils” surrounding an area of study.
But this does not mean that this type of research
does not follow a process. In fact, it is quite the opposite.
Grounded theory allows researchers to follow a process that
allows for creativity in discovering and understanding
JHHSA SPRING 2013 473
social processes and phenomena (Glaser & Strauss, 1967). I
first discuss the origins and philosophical underpinnings of
grounded theory and, in the following sub-section, the
benefits of a grounded theory approach and justification for
why I employed this approach to study network leadership.
Grounded Theory’s Origins and Philosophical
Underpinnings
Glaser and Strauss (1967) state that grounded
theory is the “discovery of data systematically obtained
from social research” (p. 2). Creswell (2003) elaborates on
their definition by noting that grounded theory is a strategy
“in which the researcher attempts to derive a general,
abstract theory of a process, action, or interaction grounded
in the views of participants in a study” (p. 14).
Glaser states that grounded theory is useful to
“researchers and practitioners in fields that concern
themselves with issues relating to human behavior in
organizations, groups, and other social configurations”
(Glaser, 1992, p. 13). The nature of grounded theory is to
7. ensure that the theory being generated will “fit” the
situation being studied and that it will “work” in terms of
describing the behavior being observed (Glaser & Strauss,
1967, p. 3). It follows from this, then, that for theory to be
useful for understanding social phenomena and behavior,
the best way to develop theory is to “ground” it in data.
In using the grounded theory method to develop
theory, one begins with an area of study and allows what is
relevant to that area to emerge from the data. Two key
characteristics define grounded theory: a de-emphasis on
the verification of theory and an emphasis on the
generation of theory. Glaser and Strauss (1967) proposed
grounded theory as a way to counteract the preoccupation
with the verification of theory in both qualitative and
quantitative research that had dominated social science
since the 1940s, to address some of the weaknesses of
474 JHHSA SPRING 2013
qualitative theory, and to allow for the development of
theory that would be meaningful to both practitioners and
scholars.
Glaser and Strauss (1967) argued that scholars were
too concerned with verifying the “grand theories” bestowed
on us by “great men” such as Marx, Weber, and Durkheim.
After World War II, there was significant growth in the
development and distribution of quantitative methods (e.g.,
survey research) that could be used to test and verify these
theories. In The Discovery of Grounded Theory, Glaser and
Strauss (1967) offer a polemic against Robert Merton and
the positivist approach:
8. His reasoning necessarily leads to the
position that data should fit the theory, in
contrast to our position that the theory
should fit the data [emphasis in the original]
(p. 261).
While grounded theory acknowledges that verification of
theory is important, it argues that this task should be
subordinate to the generation of theory.
Glaser and Strauss (1967) also proposed grounded
theory as a way of strengthening qualitative research. They
argued that qualitative approaches suffered from an
overemphasis on verification, but more importantly were
increasingly labeled as “impressionistic” and criticized for
not being rigorous or systematic enough. On the other
hand, quantitative methods were seen as rigorous and
“more scientific.” As a direct result of this, over time,
quantitative methods gradually usurped qualitative
approaches to studying and gaining insight about social
phenomena.
With the publication of The Discovery of Grounded
Theory, however, Glaser and Strauss tried to formalize and
systematize “grounded” theory, and qualitative methods
JHHSA SPRING 2013 475
more generally, as a legitimate form of inquiry into social
phenomena. What was unique about their approach,
9. however, was that they did not discount the importance and
benefits of scientific rigor that had been so lauded in
quantitative research:
It is vital to note that the fundamentals of
Grounded Theory, the underlying analytic
methodology, are in very large measure
drawn from the analytic methodology and
procedures of inductive quantitative analysis
laboriously discovered by researchers and
students in the Department of Sociology and
the Bureau of Applied Social Research at
Columbia University in the 1950’s and
1960’s (Glaser, 1992, p. 7).
Perhaps the most important difference to note
between grounded theory and other approaches to
qualitative research is grounded theory’s emphasis on
theory development. Glaser and Strauss (1967) argue that
the growth of positivism and the emphasis on verification
of theory rather than generation of theory resulted in a
significant gap between theory and empirical research.
Theory that was “grounded” in data, they proposed, would
contribute toward “closing the embarrassing gap between
theory and empirical research” (Glaser & Strauss, 1967, p.
vii).
During the past thirty-five years, researchers from a
variety of different disciplines, including psychology,
information science, education and health care, have used
grounded theory as a means of exploring social
relationships and phenomena.
10. 476 JHHSA SPRING 2013
Grounded Theory as a Means of Exploring Network
Leadership
Scholars argue that new methods are required to
research and understand new organizational forms such as
network organizations. Daft and Lewin (1993) note the
trend away from bureaucratic, hierarchical structures
toward more loosely coupled, flexible structures that
emphasize learning. They contend that in order for
managers to function in this new environment and for
researchers to understand this new environment, these
emergent forms of organization, which include network
organizations, require new forms of empirical investigation
(Daft & Lewin, 1993). This new form of investigation,
according to Daft and Lewin (1993), “will be characterized
by midrange theory and method, grounded research, and
research that does not presume to test hypotheses” (p. ii).
Daft and Lewin (1993) argue that the primary benefit of a
grounded theory approach to emergent organizational
structures is:
A midrange, grounded study of some part of
a new organizational form would enable a
scholar to learn firsthand about it and
provide new theory. We are proposing a role
for organizational scholars that is primarily
one of developing new variables and
theories to describe new phenomena, not to
test hypotheses. If done well, the emerging
knowledge will advance both organization
11. theory and the practice of management (p.
iii).
More recently, other scholars, including McGuire and
Agranoff (2007) and Agranoff (2004), have explored the
relevance of grounded theory as an approach to studying
networks, noting that employing grounded theory will help
JHHSA SPRING 2013 477
answer some of the “big questions” about network
management by allowing researchers to delve more deeply
into the “black box” of networks and examine them from
the inside out.
Scholars also contend that leadership theory would
be enhanced by the generation of theories that are
“grounded” in what leaders are actually doing (Parry,
1998). The applicability of grounded theory to leadership
has been demonstrated in a number of studies (Hunt, 1991;
Hunt & Ropo, 1995). Hunt and Ropo (1995) argue that
grounded theory can be effective as a means of studying
social processes, such as leadership because “grounded
theory emphasizes dynamism, whereas mainstream analysis
emphasizes static structure” (p. 381). Therefore, grounded
theory allows one to understand the dynamic of “change”
as it relates to leadership, as opposed to traditional
approaches, which study leadership at one point in time. As
a result of the focus on quantitative methods, there have
been increased calls issued for more qualitative work on
leadership (e.g., Bryman, Stephens, & a Campo, 1996;
Parry, 1998).
12. For this research, the choice of grounded theory as a
strategy of inquiry was appropriate for several reasons.
First, this is an exploratory study in that its purpose is to
generate theory about network leadership strategies that is
grounded in empirical evidence. Eisenhardt (1989) notes
one of the strengths of grounded theory is it “produces
theory which closely mirrors reality” (p. 547). The nature
of grounded theory is to move from observations to the
development of concepts then to theory development
(Locke, 2001). Theory building grounded in empirical
evidence promises to contribute to the scholarly literature
in public administration and organizational theory, but at
the same time be “useful to practitioners in the settings
studied, providing them some understanding and control
478 JHHSA SPRING 2013
over situations they encounter on a daily basis” (Locke,
2001, p. 18).
The use of grounded theory also was appropriate
because the network leadership literature is
underdeveloped; the theories related to network
management that do exist were not systematically obtained
from observations and may lack validity. Thus, more
empirical studies need to be conducted (Agranoff &
McGuire, 2001). The emergent theory is more likely to be
empirically valid because the theory building process is so
closely linked with empirical observations.
DATA COLLECTION AND ANALYSIS
13. Grounded theory is an iterative process during
which there is interplay among data collection, analysis and
theory generation. Glaser and Strauss (1967) refer to this as
the constant comparative method of analysis. The idea
behind the constant comparative method is that a researcher
gathers data, analyzes the data, and compares them against
previously collected data in order to determine variables
and uncover emerging relationships between variables and
categories.
The overlap of data collection and data analysis
serves several purposes. First, it allows the researcher to
move ahead with data analysis during the data collection
stage. Second, it permits researchers to be flexible with
regard to things that might emerge from the data. For
example, Eisenhardt (1989) notes that it enables one to
make adjustments to the data collection instruments that
“allow the research to probe emergent themes or to take
advantage of special opportunities which may be present in
a given situation” (p. 539). Finally, the constant
comparative method serves as a source of validity because
the process generates further data and knowledge, leading
JHHSA SPRING 2013 479
to theory that is more reliable because it is more clearly
defined and less abstract (Parry, 1998).
In the following sub-sections, I discuss how I
conducted this research. In keeping with the tenets of
14. grounded theory, I have not separated data collection and
analysis into separate sections; instead, I discuss them
jointly. I begin by discussing the types of data or “data
slices” that Glaser and Strauss (1967) recommend
collecting to develop grounded theory. I then discuss the
six phases of this research in light of the techniques Glaser
and Strauss (1967) discuss and Strauss and Corbin (1998)
elaborate on for collecting, organizing and analyzing these
data slices and developing theory that is truly “grounded”
in the data.
Data Slices: Interviews, Field Notes, Observations and
Documents
Glaser and Strauss (1967) advocate gathering
“slices of data”—which others refer to as “triangulation”—
as a means of understanding conceptual categories from
different vantage points. Caudle (1994, p. 89) defines
triangulation as “the combining of methods, data sources,
and other factors in examining what is under study” in
order to determine whether or not they are congruent and/or
complementary. The nature of this research was to uncover
recurring patterns and to describe the administrative
processes, activities, and resources involved in the
development of standards in a network setting. Grounded
theory, as distinguished from other forms of qualitative
research such as phenomenology, demands that researchers
consider multiple forms of data (Suddaby, 2006). In order
to develop theory that takes into account multiple
perspectives and different types of data, I collected data
from a variety of sources, including one-on-one interviews,
field notes, observations and NQF-related documents.
15. 480 JHHSA SPRING 2013
Interviews. Thirty-nine interviews informed this research.
Of these, I conducted semi-structured interviews with 21
individuals who were active in the NQF during its
formative years. Of the 25 people I contacted, 19 agreed to
an interview, three said no (one gave no reason for saying
no, the other two individuals said that s/he was too busy
and his/her agency would not allow him/her to be
interviewed), two did not respond, and one referred me to
another person, who I interviewed. A colleague also was
conducting her research about the NQF. Since both of our
studies were investigating aspects of the NQF as a network
organization and our lines of questioning and interview
protocol were similar, she and I shared the interviews that
we had conducted and transcribed. She shared 18
interviews with me. I analyzed and coded these as I did my
own interviews. Strauss and Corbin (1998) refer to this type
of sharing and coding data sets “secondary analysis” and
state a “researcher building theory can code these materials
as well, employing theoretical sampling in conjunction with
the usual coding procedures” (p. 213).
Glaser and Strauss (1967) recommend theoretical
sampling of different groups to maximize the similarities
and differences of information. Therefore, the interviewees
were representative of the diverse organizations that belong
to the NQF and consisted of individuals who were involved
at all levels of the NQF, including NQF staff members, and
those who served on the Board of Directors, the Never
Events Steering Committee and each of the four Member
Councils (Consumers, Purchasers, Providers, and Research
and Quality Improvement Organizations).
16. The interviewees initially were contacted by phone
or e-mail about participating in the study. Whether by
phone or e-mail, I introduced myself, provided them with
information about the project, and asked them if they would
be willing to participate in an interview. The interviews
occurred either by phone or in person. Each interview
JHHSA SPRING 2013 481
lasted approximately one hour, and, in many cases, quite a
bit longer. In order to ensure anonymity, I have not
divulged the names of the individuals I interviewed or
mentioned their names or positions in the text. I gathered
additional contacts using snowball or chain sampling. In
snowball sampling, interviewees are asked to provide other
names of individuals who know about the issue (Caudle,
1994).
Different stages of theory development demand
different interview techniques (Polit & Beck, 2004;
Wimpenny & Gass, 2000). Glaser and Strauss (1967) state
that during the initial period of data collection and analysis,
interviews may take the form of unstructured conversations
and, as the theory begins to emerge from the data, the
interviews will become more focused and structured.
During the initial phases of my data collection, the
interviews tended to be more conversational and broadly
focused and I developed an initial interview guide that
reflected this. As the theory began to emerge, I developed
an interview guide in which the questions were more
focused than they were initially. The interviews themselves
became more structured. Fielding (1994) notes that some of
the strengths of semi-structured interviews are that they
17. allow the researcher to ask questions in the same way each
time, while allowing for flexibility in the sequence of
questions and the depth of exploration.
Throughout the process, I taped and transcribed
each of the interviews after asking a subject for his or her
consent. All of the interviewees consented to being taped.
After I completed each interview, I transcribed it into an
MS Word document and uploaded it into QSR N6.
Richards and Richards (1994) maintain that software such
as QSR N6, NVivo, and Atlas/ti is essential to maintaining
precision and rigor in data analysis. After I uploaded the
interview into QSR N6, I began coding it; I elaborate on
this process in later sections.
482 JHHSA SPRING 2013
The one-on-one interviews not only allowed me to
gather information about the specific management
strategies the NQF used to manage the development of
standards but also permitted me to observe the body
language and tone of voice of the network managers and
members and the physical setting of the NQF. From the
interviews I gleaned quotes and gathered opinions and
information about how the participants interacted within
the network. I used “memoing” to record thoughts,
interpretations, questions and directions for further data
collection (Strauss & Corbin, 1998). These memos were
written to explore what was emerging from the data, what I
was learning from the literature, and how I linked the two
in developing an interview guide and theory.
18. Field notes. Field notes are an important part of grounded
theory research because they allow a researcher to record
observations and thoughts about the research process and
topic as the research progresses. Eisenhardt (1989)
recommends writing down impressions and asking such
critical questions as “What am I learning?” and “How does
this case differ from the last?” after interviews and
observations.
I kept two types of field notes: a set for interviews
and a set of notes outlining what I observed at the two NQF
Annual Meetings I attended. As part of the interview
process, I kept records of notes that I took during the
interviews. I also took time immediately after I completed
each interview to record my impressions and thoughts
about what I learned from the interview. While attending
the NQF Annual Meetings, I took notes about the issues
discussed at the meetings, differing opinions and who
raised them, Kizer’s representation of the NQF, and my
reactions to and thoughts about various events and topics
discussed.
JHHSA SPRING 2013 483
Written documents. I also gathered and analyzed documents
related to the NQF, including working papers about the
NQF’s first project—the “Never Events” project—minutes
from committee meetings, and briefing materials. In order
to gain access to these documents, I contacted the NQF’s
staff members and executive officers involved in
overseeing the “Never Events” project as well as
19. individuals involved in the development of the consensus
report. A confidential source close to the NQF also
provided me with many financial and other documents
pertaining to the NQF’s creation and the Never Events
project. I also collected data from public sources, including
newspaper and journal articles, speeches Kizer gave that
were available on the Internet and information from the
NQF’s web site.
One can learn a great deal about the organizational
structure, operations, history and philosophy of an
organization through the examination of written
documents, and these documents provided me with a strong
sense and appreciation of the NQF as an organization. I
used these documents to provide me with information about
reports I might want to obtain and the individuals I might
want to contact for interviews during the initial stages of
my research.
Observation. I also attended and observed the proceedings
of two NQF Annual Meetings. I attended the two meetings
for several reasons. First, they gave me an opportunity to
observe first-hand how the NQF conducts business.
Second, I was able to meet people and question them
informally about the NQF at these meetings. Third, as the
research progressed and leadership became the focal point
of the study, the meetings gave me a chance to observe
Kizer in action and determine whether what I was
observing matched with what I was hearing from the
interviewees. Finally, the annual meetings gave me a
484 JHHSA SPRING 2013
20. chance to learn about and keep up-to-date on the various
issues affecting the NQF and its operations.
The Research Phases: Collecting, Analyzing and
Developing Theory
Glaser and Strauss (1967) do not prescribe how to
conduct research using the grounded theory method in their
seminal work. Strauss and Corbin (1998), however,
elaborate on the original work and outline some steps for
conducting research using grounded theory: open coding,
axial coding, and selective coding. Strauss and Corbin
(1998) state that the process is “a free-flowing and creative
one in which analysts move quickly back and forth between
types of coding, using analytic techniques and procedures
freely and in response to the analytic task before analysis”
(p. 58). Since I was new to grounded research, I followed
the approach outlined by Strauss and Corbin (1998). I
conducted this research in six phases and delineate the
tasks I undertook for each phase of the data collection and
analysis process in the following sections.
Phase one: Initial contact with the NQF and immersion in
the health care literature. I began the project by
establishing contact with NQF staff and Dr. John
Eisenberg, then Director of the Agency for Healthcare
Research and Quality (AHRQ)—which provided some of
the initial funding for the NQF. I read widely about the
health care system, including the history of health care in
the United States (Starr, 1984; Millenson, 1997); the
history of quality improvement efforts (Brennan &
Berwick, 1996); quality problems in health care
(President’s Advisory Commission, 1998; Institute of
Medicine, 1999, 2001), including research and information
21. about medical errors and patient safety (Bogner, 1994) and
quality initiatives underway in the health care industry. I
also read about high-reliability systems and human error
JHHSA SPRING 2013 485
(Perrow, 1999; Reason, 1990) and error-reporting systems
and quality improvement efforts underway in other
industries, including the aviation, nuclear and chemical
industries (Rees, 1994; Gunningham & Rees, 1997).
Phase two: Literature review and development of initial
research questions. During Phase Two, I narrowed the
focus of my study to the NQF and its role as a network
organization charged with coordinating quality
improvement efforts in the health care industry. I also
began to read literature about networks and network
management. One of the common misperceptions about
grounded theory is that a researcher should come into the
research as a “blank slate” with no prior immersion in or
knowledge about the literature (Suddaby, 2006, p. 634).
However, Glaser and Strauss (1967) argue for a link
between substantive theory, or the theory associated with a
particular subject area, and the generation of grounded
formal theory:
We believe that although formal theory can
be generated directly from the data, it is
more desirable, and usually necessary, to
start the formal theory from a substantive
one. The latter not only provides a stimulus
to a ‘good idea’ but it also gives an initial
22. direction in developing relevant categories
and properties and in choosing possible
modes of integration. Indeed it is difficult to
find a grounded formal theory that was not
in some way stimulated by substantive
theory (p. 79).
From this literature review, I identified the broad
questions that guided the research questions during the
preliminary phases of this project: (1) how are these new
486 JHHSA SPRING 2013
organizational forms (i.e., networks) managed? and (2)
what is the U.S. national government’s role in this process?
While these two questions outlined the broad purpose of
this study, I developed the following questions to guide me
initially as I gathered specific information about the NQF:
1. How and why was the NQF created?
2. How is the NQF organized?
3. How does the NQF manage the
development of standards?
4. What is the federal government’s role in
this process?
5. What lessons does NQF’s administrative
experiment hold for students of public
administration?
From my initial literature review and document
23. collection efforts, I developed a preliminary interview
guide that I used for conducting the initial exploratory
interviews. Since the process was exploratory, the
interview questions served as probes to generate data that I
later tied-back to the existing literature during Phase Three.
Phase three: Initial interviews and identification of the
emergent themes through open coding. During Phase
Three, I conducted, coded, and began to analyze the initial
exploratory interviews and continued collecting documents
related to the NQF. I interviewed seven individuals
involved in the “Never Events” project.
Strauss and Corbin (1998) state that the first step in
the process of theory building is the development of
concepts. The initial interviews allowed me to begin the
process of organizing and interpreting the data. Open
coding is the “process through which concepts are
identified and their properties and dimensions are
discovered in data” (Strauss & Corbin, 1998, p. 101).
JHHSA SPRING 2013 487
During open coding, “data are broken down into discrete
parts, closely examined, and compared for similarities and
differences” (Strauss & Corbin, 1998, p. 102). The process
enables researchers “to group similar events, happenings,
and objects under a common heading or classification”
(Strauss & Corbin, 1998, p. 103). Researchers can analyze
documents by line, by sentence or paragraph, or as a whole
(Strauss & Corbin, 1998). From there, categories are
identified and their properties and dimensions are specified
24. (Strauss & Corbin, 1998).
To assist me with the coding process, I used QSR
N6. One of the strengths of using qualitative software is
that it allows the themes to emerge from the interviews. As
I coded the interviews sentence by sentence, I began to pull
common themes from them and group them into broad
categories. As I coded these interviews, the broad theme of
leadership and, more specifically, Kizer’s leadership in
creating and building the NQF, consistently emerged.
Since the NQF was a relatively new organization, I
began to think about the role of a leader in building a
network organization. I developed the following question to
guide me: “What are some of the key tasks a leader
engages in to create a network organization?” Since I had
initially started the research with a broad area for
investigation, network management, asking these questions
effectively allowed me to narrow the scope and focus of my
research and to develop a more finely tuned research
question. This is in keeping with Strauss and Corbin
(1998), who state, “Although the initial question starts outs
broadly, it becomes progressively narrowed and more
focused during the research process as concepts and their
relationships are discovered” (p. 41).
One way to investigate phenomena and develop
sensitivity or insight into the data and the concepts being
developed is to examine the literature for relevant
information (Strauss & Corbin, 1998). Eisenhardt (1989)
488 JHHSA SPRING 2013
25. explains the importance of looking at a broad range of
literature when developing theory:
An essential feature of theory building is
comparison of the emergent concepts,
theory, or hypotheses with the extant
literature. This involves asking what this
similar to, what does it contradict, and why.
A key to this process is to consider a broad
range of literature (p. 544).
Furthermore, Eisenhardt (1989) argues: “While linking
results to the literature is important in most research, it is
particularly crucial in theory-building research because the
findings often rest on a very limited number of cases” (p.
545). It is important to look at two types of literature—
those that conflict with the findings and those that agree
with the findings. The former allows one to be more
creative and groundbreaking, and “the result can be deeper
insight into both the emergent theory and the conflicting
literature, as well as sharpening the limits of
generalizability of the focal research” (Eisenhardt, 1989, p.
544). I therefore looked at the existing leadership and
network management literatures to assist me with the initial
conceptualization of “network leadership” and the possible
tasks a leader engages in to create a network organization.
Comparing the findings to extant literature in a
different area with similar findings allows a researcher to
tie “together underlying similarities in phenomena normally
not associated with each other. The result is often a theory
with stronger internal validity, wider generalizability, and
higher conceptual level” (Eisenhardt, 1989, p. 544). I
started looking at the leadership literature in order to
26. determine which area of the literature fit with my project.
Since the interviewees discussed extensively the tasks that
Kizer engaged in to get the NQF up-and-running, I decided
JHHSA SPRING 2013 489
to focus on and pull concepts from studies that outline the
tasks, activities, and roles of leaders; that is, what it is that
leaders actually do and the skills that are needed to
accomplish their goals. For example, Selznick (1984) in his
classic work, Leadership and Administration, delineates
some of the critical tasks a bureaucratic leader might
undertake in order to build an organization and its
institutional character and culture, and Doig and Hargrove
(1987) examine public sector leadership and discuss the
leadership tasks undertaken by leaders during the formative
stages of organizational development.
Phase four: Refinement of the interview guide and the
development of subcategories through axial coding. During
Phase Four, I conducted and analyzed additional interviews
and attended an annual meeting. After I conducted the
initial interviews and started to extrapolate themes, I turned
to the literature to help me with the development of a more
focused interview guide. The guide I developed covered the
following topics: the role of the member organizations in
the NQF, the Never Events project, key organizational
actors in the NQF’s environment, the NQF’s Board of
Directors, the Member Councils, the NQF’s staff, the role
of professional expertise in the NQF, Kizer’s role in the
NQF, and the NQF’s challenges and accomplishments. I
used the in-depth interview instrument of open-ended
27. questions as a guide when interviewing participants.
During this phase, I engaged in axial coding, which
is the “process of relating categories to their subcategories,
termed ‘axial’ because coding occurs around the axis of a
category, linking categories at the level of properties and
dimensions” (Strauss & Corbin, 1998, p. 123). The purpose
of axial coding is “to begin the process of reassembling
data that were fractured during open coding” (Strauss &
Corbin, 1998, p. 124). Strauss and Corbin (1998) identify
several tasks associated with axial coding:
490 JHHSA SPRING 2013
1. Laying out the properties of a category
and their dimensions, a task that begins
during open coding
2. Identifying the variety of conditions,
actions/interactions, and consequences
associated with a phenomenon
3. Relating a category to its subcategories
through statements denoting how they are
related to each other, and
4. Looking for cues in the data that denote
how major categories might relate to each
other (p. 126).
I began to ask questions about the larger categories (i.e., the
three critical tasks a network leader engages in to build a
network organization) that were emerging from the data:
defining the mission, building a social base, and managing
diverse interests through the consensus development
28. process. These questions allowed me to develop
subcategories that explain each category in greater detail.
According to Strauss and Corbin (1998), “subcategories
answer questions about the phenomenon such as when,
where, why, who, how, and with what consequences, thus
giving the concept greater explanatory power” (p. 125).
Phase five: Refinement of the theory through selective
coding. During Phase Five, I attended another annual
meeting and engaged in selective coding. Selective coding
is the “process of integrating and refining the theory”
(Strauss & Corbin, 1998, p. 143). Integration involves
organizing categories “around a central explanatory
concept” (Strauss & Corbin, 1998, p. 161). Strauss and
Corbin (1998) outline several tools that can be used to
assist with integration: telling or writing the storyline, using
diagrams, sorting and reviewing memos, and using
computer programs. After integration, the researcher begins
JHHSA SPRING 2013 491
to refine the theory. “Refining the theory consists of
reviewing the scheme for internal consistency and for gaps
in logic, filling in poorly developed categories and
trimming excess ones, and validating the scheme” (Strauss
& Corbin, 1998, p. 156). In this case, I wrote about the
leadership tasks interviewees maintained that Kizer
engaged in, using the memos I had written to assist me with
developing the narrative about the leadership tasks
involved in creating an NAO. As part of the integration
phase, I compiled my findings into a conference paper. The
conference presentation enabled me to obtain reactions to
my findings and refine my data further.
29. Phase six: Closure. Strauss and Corbin (1998) encourage
the researcher to consider three things when deciding to
conclude data collection and analysis: time, money and,
most importantly, theoretical saturation. Although the first
two issues are self-explanatory, the third deserves an
explanation. In order to reach closure, Eisenhardt (1989)
maintains that researchers should constantly ask themselves
two important questions. “When should I stop adding
cases?” and “When should I stop moving between data
collection and analysis?” The answer to both is theoretical
saturation, which Strauss and Corbin (1998, p. 143) define
as “The point in category development at which no new
properties, dimensions, or relationships emerge during
analysis.” There is nothing new that can be added through
further sampling; that is, collecting further information will
not enhance the categories and their properties any further.
Glaser and Strauss (1967, p. 224) maintain that closure
should occur “When the researcher is convinced that his
[sic] conceptual framework forms a systematic theory, that
it is a reasonably accurate statement of the matters studied,
that it is couched in a form possible for others to use in
studying a similar area, and that he can publish is results
with confidence, then he is near the end of his research.” I
492 JHHSA SPRING 2013
stopped collecting data when I started to hear the same
stories and examples from interviewees. I also had a well-
developed theoretical framework and found it difficult to
collect information that would shed additional light on it.
30. LIMITATIONS
One concern associated with grounded theory and
this study is whether the findings are transferable. While
Glaser and Strauss (1967) do not discuss this issue directly,
they discuss credibility and state:
“The reader’s judgment of credibility will
also rest upon his assessments of how the
researcher came to his conclusions. He will
note, for instance, what range of events the
researcher saw, whom he interviewed, who
talked to him, what diverse groups he
compared, what kinds of experiences he had,
and how he might have appeared to various
people whom he studied” (p. 231).
Locke (2001), however, notes that by gathering diverse
data observations, the general applicability or analytic
generalizability of the theory can be extended.
Another concern is the subjectivity of the
researcher. That is, the researcher becomes the primary
measurement instrument in the investigative process, in
contrast to that of quantitative research where the
researcher tries to stay removed from the process (Caudle,
1994). In grounded theory, one must let the theory emerge
from the data. This is not an easy task, especially
considering that researchers bring their own sets of biases
and expectations to research, but an astute grounded
theorist recognizes and is sensitive to bias. In order to
counteract researcher bias, a researcher needs to present
31. JHHSA SPRING 2013 493
evidence that corroborates the data (Caudle, 1994). One
way to do this is to gather multiple perspectives and
documents about the same incident (Eisenhardt, 1989). By
doing so, validity is enhanced because one is relying on
more than one person (and more than one document) to
provide an understanding of the events that occurred.
Lincoln and Guba (1985) also recommend that the
researcher find someone to examine the research findings
and play “devil’s advocate.” In order to address these
issues, I asked several individuals to serve as my devil’s
advocates.
A third concern relates to the interview process and
document analysis. Once interviews are granted, there is a
concern with being able to move beyond “scripted”
responses in order to get the “real” story. Potential
problems related to document analysis include identifying
the relevant documents and, once identified, gaining access
to those documents. Another concern is whether or not the
documents reflect reality. That is, do they accurately reflect
decision processes and decisions or were they written to
protect individuals? For example, one concern might be
that the minutes might not have been written in a way that
reflects the actual discussions and debates that occurred.
Another concern is whether minutes and memos contain
more than cursory information. In order to address these
concerns, I collected as many documents as possible and
spoke to a wide variety of individuals to verify that the
stories I had heard were indeed accurate.
A final concern is with the reliability or
32. dependability of the research (Neuman, 2003). The concern
with a study’s reliability can be remedied with replication.
In qualitative research, however, nothing remains static;
that is, reality is constantly changing, making replication
difficult. Furthermore, it is impossible to replicate such
things as semi-structured interviews. Qualitative
researchers argue that because processes are not stable over
494 JHHSA SPRING 2013
time and the research process itself is supposed to be
dynamic the preoccupation of “positivist” researchers with
regard to replication is unfounded (Neuman, 2003; Chenitz
& Swanson, 1986; Denzin, 1970). Indeed, Chenitz and
Swanson (1986) point out that replication is not important
to grounded theory. They maintain it is more important that
researchers be able to use the grounded theory to explain,
understand and predict phenomena in similar situations.
CONCLUSION AND LESSONS LEARNED
Janesick (1998) uses the metaphor of dance to
describe qualitative research. Grounded theory also
exemplifies the metaphor of dance in that it is an iterative,
creative process, which lends itself to experimentation and
exploration of concepts and ideas. During this process, I
learned five lessons about using grounded theory to
investigate the “black box” of network leadership.
First, grounded theory is not easy to master. There
33. are few prescriptions for how to conduct grounded theory
research. In my experience, Suddaby (2006) is correct in
observing: “The seamless craft of a well-executed
grounded theory study…is the product of considerable
experience, hard work, creative and, occasionally, a healthy
dose of good luck” (p. 639). Furthermore, many researchers
have found that competence in using grounded theory
techniques improves over time and with experience
(Suddaby, 2006). Learning to use grounded theory
techniques requires patience, flexibility, the ability to
tolerate ambiguity and time. The constant movement
between data analysis and data collection requires patience.
Developing grounded theory also demands that the
researcher be able to remain flexible and responsive to
emerging themes. It requires flexibility in the sense that one
must be willing to follow the data’s recommendations and
pursue an unintended line of inquiry. A researcher therefore
JHHSA SPRING 2013 495
also must be comfortable with ambiguity in the research
process. Since the data drive the direction of the research
and the lines of inquiry, grounded theory cannot be
“mapped” in advance. Researchers who must “map” the
research path ahead of time may have some difficulty
conducting research using a grounded theory approach.
These characteristics also mean that grounded theory
research is time-consuming.
Secondly, grounded theory research requires a
process. One of the benefits of conducting grounded theory
research is that it leads to fresh insights about the social
phenomenon under investigation. Achieving this requires
34. researchers to be intuitive, flexible, and open-minded. This
does not mean, however, that when conducting grounded
theory research that “anything goes” (Suddaby, 2006; Jones
& Noble, 2007). Although I certainly found that there is
tension between creativity and the rigorous application of
formal rules in conducting grounded theory, the perception
that grounded theory is an excuse to throw methodological
rigor out the window is wrong. Suddaby (2006) notes that
in evaluating grounded theory research, he checks that a
researcher has followed the core analytic tenets of
grounded theory, including theoretical sampling, constant
comparison, theoretical sensitivity, and the technical
language a researcher uses to describe the research process
is accurate, because he believes “there is a clear connection
between rigor in language and rigor in action” (p. 640).
Through this research I learned that being transparent about
how I collected, coded and analyzed my data is as
important in qualitative research as it is in quantitative
research.
Thirdly, qualitative software programs are helpful
in conducting grounded theory research. A grounded theory
approach can leave one feeling inundated by tons of data
that can be characterized as thematically diverse. I found
that using a software program, in particular QSR N5 and
496 JHHSA SPRING 2013
later N6, helped to counteract the feeling that I was
“drowning in data” by providing me with the tools to
organize and analyze the data efficiently. Although I
ultimately decided how to interpret the data and which
categories to focus on, QSR N5 and N6 allowed the
35. categories and themes to emerge from the data. The
programs, however, had too many “bells and whistles” that
I did not use and was a bit complex for my research needs.
Fourthly, transcribing my own interviews was
essential to understanding the data. The more exposure one
has to the data, the more familiar it becomes and the more
likely the researcher will be able to “listen to” and “hear”
what the data are trying to tell her. When one is conducting
an interview, one is more focused on asking the questions
and guiding the interview than on analyzing what is
actually occurring during an interview (tone of voice, body
language, etc.). Similarly, if one does not transcribe their
own interviews but reads a transcription, one misses
“hearing” the interview and the subtle cues and insights
that might be conveyed by listening to the interview.
Finally, and perhaps most importantly, grounded
theory has contributed substantially to my personal growth
as a scholar and researcher. Strauss and Corbin (1998)
outline the characteristics of a grounded theorist and
emphasize that these skills do not need to be developed
prior to engaging in grounded theory research:
• The ability to step back and critically
analyze situations.
• The ability to recognize tendency toward
bias.
• The ability to think abstractly.
• The ability to flexible and open to helpful
criticism.
• Sensitivity to the words and actions of
36. respondents.
JHHSA SPRING 2013 497
• A sense of absorption and devotion to the
work process (p. 7).
To this list, I would add intuition. I have always been very
intuitive and able to identify themes, and grounded theory
enabled me to draw on these strengths. As a new
researcher, conducting grounded theory research refined
and sharpened my ability to identify and ask broader
research questions and connect these questions to the
broader scholarly literature in the areas of network
management and leadership.
Strauss and Corbin (1998), however, neglect to
mention one important aspect of the research process that
the grounded theory approach, and qualitative methods
more generally, help new researchers develop: developing
and designing interview questions and guides and
conducting interviews. As a new researcher, this process,
with its emphasis on constant comparison between data
collection and analysis, helped me to develop and fine-tune
relevant questions. Furthermore, when I began this
research, I found it difficult and stressful to conduct
interviews. With more experience, I became more
comfortable with the interview process.
37. 498 JHHSA SPRING 2013
REFERENCES
Agranoff, R. (2004, March). Inside the Network Operation.
Paper presented at the annual conference of the
American Society for Public Administration.
Portland, OR.
Agranoff, R., & McGuire, M. (2001). After the network is
formed: Process, power, and performance.” In M.
P. Mandell (Ed.), Getting results through
collaboration: Networks and network structures for
public policy and management (pp. 11-29).
Westport, CT: Quorum Books.
Blumer, H. (1969). Symbolic interactionism. Englewood
Cliffs, NJ: Prentice Hall.
Bogner, M. S. (Ed.). (1994). Human error in medicine.
Hillsdale, NJ: Lawrence Erlbaum Associates.
Brennan, T. A., & Berwick, D. M. (1996). New rules:
Regulation, markets, and the quality of American
health care. San Francisco: Jossey-Bass Publishers.
Bryman, A., Stephens, M., & a Campo, C. (1996). The
38. importance of context: Qualitative research and the
study of leadership. The Leadership Quarterly, 7,
353-370.
Castells, M. (2000). The rise of the network society (2nd
ed.). Malden, MA: Blackwell Publishers.
Caudle, S. L. (1994). Using qualitative approaches. In J. S.
Wholey, H. P. Hatry, & K. E. Newcomer (Eds.),
Handbook of practical program evaluation (pp. 69-
95). San Francisco: Jossey-Bass Publishers.
JHHSA SPRING 2013 499
Chenitz, W. C., & Swanson, J. M. (Eds.). (1986). From
practice to grounded theory: Qualitative research
in nursing. Menlo Park, CA: Addison Wesley
Publishing Company.
Creswell, J. W. (2003). Research design: Qualitative,
quantitative, and mixed methods approaches.
Thousand Oaks, CA: Sage Publications.
Daft, R. L., & Lewin, A. Y. (1993). Where are the theories
for “new” organizational forms? An editorial essay.
39. Organization Science, 4, i-vi.
Denzin, N. K. (1970). The research act: A theoretical
introduction to sociological methods. New York:
McGraw-Hill.
Denzin, N. K. (1994). The art and politics of interpretation.
In N. K. Denzin & Y. S. Lincoln (Eds.), Handbook
of Qualitative Research (pp. 500-515). Thousand
Oaks, CA: Sage Publications.
Doig, J. W., & Hargrove, E. C. (Eds.). (1987). Leadership
and innovation: A biographical perspective on
entrepreneurs in government. Baltimore, MD: The
Johns Hopkins University Press.
Eisenhardt, K. (1989). Building theories from case study
research. The Academy of Management Review, 14,
532-550.
Fielding, N. (1994). Varieties of research interviews. Nurse
Researcher, 1, 4-13.
40. 500 JHHSA SPRING 2013
Glaser, B. G. (1992). Basics of grounded theory analysis:
Emergence versus forcing. Mill Valley, CA:
Sociology Press.
Glaser B. G., & Strauss, A. L. (1967). The discovery of
grounded theory: Strategies for qualitative
research. New York: Aldine Publishing Company.
Goldsmith, S., & Eggers, W. D. (2004). Governing by
network: The new shape of the public sector.
Washington, DC: Brookings Institution Press.
Gunningham, N. & Rees, J. V. (1997). Industry self-
regulation: An institutional perspective. Law &
Policy, 19, 363-414.
Hoflund, A. B. (2012a, forthcoming). Designing a
Decision-Making Process for a Network
Administrative Organization: A Case Study of the
National Quality Forum's Consensus Development
Process. Public Organization Review.
Hoflund, A. B. (2012b). Building a Network
41. Administrative Organization’s Social Base: Lessons
From the National Quality Forum, Administration
& Society, first published on February 16, 2012 as
doi:10.1177/0095399711433695.
Hoflund, A. B., & Farquhar, M. B. (2008). Challenges of
Democratic Experimentalism: A Case Study of the
National Quality Forum in Health Care. Regulation
and Governance, 2, 121-135.
Hunt, J. G. (1991). Leadership: A new synthesis. Newbury
Park, CA: Sage.
JHHSA SPRING 2013 501
Hunt, J. G., & Ropo, A. (1995). Multi-level leadership:
Grounded theory and mainstream theory applied to
the case of general motors. Leadership Quarterly, 6,
379-412.
Institute of Medicine. (1999). To err is human: Building a
safer health system. Washington, DC: National
Academy Press.
Institute of Medicine. (2001). Crossing the quality chasm:
42. A new health system for the 21st century.
Washington, DC: National Academy Press.
Janesick, V. J. (1998). The dance of qualitative research
design: Metaphor, methodolatry, and meaning. In
N. K. Denzin & Y. S. Lincoln (Eds.), Strategies of
qualitative inquiry (pp. 35-55). Thousand Oaks,
CA: Sage Publications.
Jones, R., & Noble, G. (2007). Grounded theory and
management research: a lack of integrity?
Qualitative Research in Organizations and
Management: An International Journal, 2, 84-103.
Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry.
Newbury Park, CA: Sage Publications.
Locke, K. (2001). Grounded theory in management
research. Thousand Oaks, CA: Sage Publications.
Marshall, C., & Rossman, G. B. (1999). Designing
qualitative research. Thousand Oaks, CA: Sage
Publications.
43. 502 JHHSA SPRING 2013
McGuire, M., & Agranoff, R. (2007, October). Answering
the big questions, asking the bigger questions:
Expanding the public network management
empirical research agenda. Paper presented at the
9th Public Management Research Conference.
Tucson, AZ.
Millenson, M. L. (1997). Demanding medical excellence.
Chicago: University of Chicago Press.
Neuman, W. L. (2003). Social research methods:
Qualitative and quantitative approaches. (5th ed.).
Boston: Allyn & Bacon.
Parry, K. W. (1998). Grounded theory and social process:
A new direction for leadership research. The
Leadership Quarterly, 9, 85-105.
Patton, M. Q. (1987). How to use qualitative methods in
evaluation. Newbury Park, CA: Sage Publications.
Perrow, C. (1999). Normal accidents: Living with high-risk
technologies. Princeton, NJ: Princeton University
Press.
44. Polit, D. F., & Beck, C. T. (2004). Nursing research:
Principles and methods. New York: Lippincott,
Williams, & Wilkins.
President’s Advisory Commission on Consumer Protection
and Quality in the Health Care Industry. (1998).
Quality first: Better health care for all Americans.
Retrieved October 30, 2011 from
http://www.hcqualitycommission.gov/final/
JHHSA SPRING 2013 503
Reason, James T. (1990). Human error. New York:
Cambridge University Press.
Rees, J. V. (1994). Hostages of each other: The
transformation of nuclear safety since Three Mile
Island. Chicago: University of Chicago Press.
Richards, T. J., & Richards, L. (1994). Using computers in
qualitative research. In N. K. Denzin & Y. S.
Lincoln, (Eds.), Handbook of qualitative research,
45. (pp. 445–462). Thousand Oaks, CA: Sage
Publications.
Rubin, E. L. (2005). Beyond Camelot: Rethinking politics
and law for the modern state. Princeton, NJ:
Princeton University Press.
Selznick, P. (1984). Leadership in administration: A
sociological interpretation (Rev. ed). Berkeley, CA:
University of California Press.
Starr, P. (1984). The social transformation of American
medicine. New York: Basic Books.
Strauss, A., & Corbin, J. (1998). Basics of qualitative
research: Techniques and procedures for
developing grounded theory. Thousand Oaks, CA:
Sage Publications.
Suddaby, R. (2006). From the Editors: What grounded
theory is not. Academy of Management Journal, 49,
633-642.
46. 504 JHHSA SPRING 2013
Wimpenny, P., & Gass, J. (2000). Interviewing in
phenomenology and grounded theory: is there a
difference? Journal of Advanced Nursing, 31, 1485-
1492.
Copyright of Journal of Health & Human Services
Administration is the property of Southern
Public Administration Education Foundation and its content
may not be copied or emailed to
multiple sites or posted to a listserv without the copyright
holder's express written permission.
However, users may print, download, or email articles for
individual use.
12-1
Chapter 12 Enhancing Decision Making
“Companies have been able to use technology to do some very
cool stuff to reach
customers in new ways, to automate operations. But one thing
many businesses haven’t
47. been able to do easily is use the data they’ve collected to find
and stamp out waste across
operations. Sifting through corporate data was supposed to
make executives more
efficient. Much of the time, though, it’s just made them more
confused.” (Fortune, March
3, 2002)
Even though this quote is ten years old, it’s still pertinent in
many companies. We’re
getting better though about turning raw data into useful
information that helps improve
decision making.
12.1 What are the different types of decisions and how does the
decision-making process work? How do information systems
support the activities of managers and management decision
making?
Each of us makes hundreds of decisions every day. If just a
fraction of those
decisions could be improved through better and more
information and better
48. processes, we’d all be delighted. Businesses feel the same way.
Customers would
be happier, employees would be more motivated, and managers
would have an
easier job. Most of all, businesses could improve their
profitability to the benefit
of all.
Business Value of Improved Decision Making
Table 12.1 provides a few examples of the dollar value that
enhanced decision making
would give to firms.
12-2
Don’t be misled into thinking that the dollar value of improving
decision-making
processes is limited to managers. As more business flatten their
organizational structures
and push decision making to lower levels, better decisions at all
levels can lead to
49. increased business value.
Types of Decisions
There are generally three classifications of decisions:
nonroutine
situations. Usually made at senior levels of management.
th definite procedures for
making the decision.
Usually made at the lowest organizational levels.
middle managers.
Figure 12.1 couples these three types of decisions with the
appropriate management level.
12-3
Figure 12.1 Information Requirements of Key Decision-Making
Groups in a Firm
50. business information but
also external industry and society changes; decisions affect
long-term, strategic goals
and the firm’s objectives.
resource allocation, short-
range plans, and performance of specific departments, task
forces, teams, and special
project groups.
onal management and project teams: Decisions affect
subunits and
individual employees regarding the resources, schedules, and
personnel decisions for
specific projects.
other employees, and most
importantly, the customer.
The Decision-Making Process
Making decisions requires four steps:
51. problems.
ing among solution alternatives.
monitoring how well
the solution is working.
These four steps are not always consecutive and may well be
concurrent or repetitive.
12-4
Managers and Decision Making in the Real World
Although information systems have gone a long way toward
improving the decision-
making process, they are not the Holy Grail. They should be
viewed as a way to assist
managers in making decisions, but not as the final answer.
52. Managerial Roles
Let’s compare the classical model of management with the
behavioral model. The
former describes the five classical functions of managers as:
Behavioral models of managers dissect the many activities
involved in the five functions
of management. That is, managers:
ation.
documentation.
53. Now, let’s take all of these activities and categorize them into
three managerial roles:
leaders, and liaisons.
spokespersons.
allocate resources,
negotiate and mediate conflicts.
Table 12.2 shows that supporting information systems exist for
only some of the
managerial behaviors but not all of them.
12-5
Table 12.2 Managerial Roles and Supporting Information
Systems
Real World Decision Making
Because you have no doubt had to make decisions in the real
world, you know for a fact
54. that the process is not as cut-and-dried as what we’ve reviewed
so far. Three reasons why
the whole process can blow up without a moment’s notice:
decision accurate,
consistent, complete, valid, timely, accessible, and of high
integrity? What if you
were making a decision about purchasing a house and found out
that there were errors
in your credit record that prevented you from obtaining the
necessary financing?
Perhaps the data was out of date or contained mistakes.
personal filters and
biases. Managers are no different. For instance, you may
suggest to your manager that
the department purchase a piece of equipment from a certain
manufacturer. Your
manager disapproves the suggestion because he had a bad
experience with that
company ten years ago. The manager’s bias negates the fact that
the company has
55. since improved and is the best and cheapest choice.
will sometimes do
whatever they can to keep the status quo. Decision makers are
no different especially
if they stand to lose. What if your department will benefit from
improving its business
processes to the benefit of all concerned except that the
manager will lose her job? It’s
likely the manager will not make decisions that will cause her to
lose her job.
Therefore, nothing gets done regarding improving processes.
12-6
High-Velocity Automated Decision Making
What if your friend asked you to find a copy of the lyrics to the
Beatles hit song “Hey
Jude?” How long do you think it would take you if Internet-
based search processes were
56. not available? Days? Weeks? A Google search for the
information takes less than five
seconds. That’s the power of high-velocity automated decision
making in today’s world.
Humans simply can’t match a computer’s speed and accuracy
for making some decisions.
Computer programmers use the same four step decision-making
process we’ve discussed
before when they create algorithms that help make these kinds
of lightning-fast decisions:
identify the problem, design a method for finding a solution,
define a range of acceptable
solutions, and implement the solution. They just have to be
careful that the algorithms are
written correctly to ensure proper decisions are made by
computers or you may end up
getting a profile of Jude Law, the actor.
Earlier we mentioned a class of decisions that are routine, very
structured, and have
definite procedures for determining the solution. In these
situations, why not automate the
process and have a computer make the decision much faster than
a human can?
57. Computers have these positive characteristics that make them
ideal for high-velocity
automated decision making:
followed
-speed processors
e task
The algorithms are structured to follow the intelligence, design,
choice, and
implementation steps we discussed as part of the decision-
making process. But, just in
case, the information systems used to process these kinds of
decisions should be
monitored and regulated by humans.
Bottom Line: Everyone makes decisions at all levels of an
organization. The goal is
to match the four decision-making organizational levels along
with the three types of
decisions to the appropriate kind of decision support system.
58. It’s important to
understand the roles and activities associated with management
decision making
and that information systems can only assist in the process.
12.2 How do business intelligence and business analytics
support decision making?
Business intelligence and business analytics provide managers
with a systematic way of
making sense of the vast amounts of data collected on
customers, suppliers, employees,
business partners, and the external business environment.
12-7
What Is Business Intelligence?
All of us collect information from our surroundings, try to
understand it, and then act on
it in an intelligent way. Businesses are no different other than
the fact that they have much
more data to collect, process, store, and disseminate.
59. A whole new industry has sprung up that helps businesses create
an infrastructure to
warehouse, integrate, report, and analyze data. This is where the
databases, data
warehouses, data marts, analytic platforms, and Hadoop that we
discussed in previous
chapters come back into the picture. Business intelligence
describes how businesses
collect, store, clean, and disseminate useful information to
executives, managers, and
employees.
Business analytics, on the other hand, are the tools and
techniques businesses use to
analyze and understand the data in a meaningful way. It’s one
thing to read a report that
says sales are 10 percent ahead of last year. Business analytic
tools, such as data mining,
statistics, online analytical processing, and models help
managers understand that part of
the cause is an increased focus on marketing to middle-aged
women with two children.
Business Intelligence Vendors
60. The top five vendors of BI and BA hardware and software
include well-known
technology companies: Oracle, SAP, IBM, Microsoft, and SAS.
These vendors are
primarily the same ones that we’ve discussed before when we
reviewed enterprise
systems. Perhaps the most interesting aspect of BI and BA
hardware and software suites
is that it’s the fastest-growing and largest segments in the U.S.
software market. That
demonstrates just how hungry businesses are to make sense of
all the data they have
available to them.
The Business Intelligence Environment
Let’s review six hardware, software, and management
capabilities that are included in the
business intelligence environment:
organizing structured and
unstructured data from different sources that people can analyze
and use.
61. process relevant
data stored in transactional databases, data warehouses, or data
marts.
to analyze data,
produce reports, respond to questions, and track their progress
using key
performance indicators (KPI).
management and
balanced scorecard methods that help managers focus on key
performance
indicators and industry strategic analyses. Requires strong
executive oversight to
ensure managers are focusing on the right issues and not just
producing reports
and dashboard screens because they can.
12-8
—MIS, DSS, and ESS: All the information
from MIS, DSS,
62. and ESS are integrated and delivered to the appropriate level of
management.
display data, thereby
making it easy to quickly understand information on a variety of
computing
devices.
Figure 12.3 helps you understand how these six elements work
together in business
intelligence and business analytics systems.
Figure 12.3 Business Intelligence and Analytics for Decision
Support
Business Intelligence and Analytics Capabilities
The days of receiving static reports that are out of date—
meaning more than 30 days or
even 30 minutes old—containing data that are meaningless are
over. Business
intelligence systems help correct that situation in five different
ways:
63. specific requirements.
isolate impacts of
parameters chosen by users.
cards: Visual reports that present
performance data chosen by
users.
reports based on
data they choose.
-level data summaries
and then drill down
to more specific data.
forecasting, what-if
scenario analysis, and analyze data using standard statistical
tools.
12-9
64. Who Uses Business Intelligence and Business Analytics?
The audience for business intelligence and business analytic
tools and techniques has
unique characteristics depending on their management level and
how they use the
systems:
tor organization activities using
dashboards and
scorecards.
data along different
dimensions.
prepackaged reports.
Figure 12.4 tells you how each division of the business
intelligence audience uses the
capabilities of these systems.
65. Figure 12.4 Business Intelligence Users
Production Reports
Because 80 percent of the people who access business
intelligence systems are casual
users, most vendors create a mass of predefined production
reports based on industry
standards and best practices. Table 12.4 gives you an idea of the
types of reports produced
for each business functional area.
12-10
Table 12.4 Examples of Business Intelligence Predefined
Production Reports
Predictive Analytics
Most times, customer behavior is very predictable if you’re
looking at and understanding
the right data. Companies use business analytic software to
figure out ahead of time how
66. reliable certain customers are regarding credit extensions, how
customers will respond to
changes in prices or services, or how successful new sales
locations will be. Those are the
kinds of questions predictive analytics can answer more quickly
and more easily than
humans. Predictive analytics helps managers ask and answer the
right questions to make
their company more successful.
Over the last few years, many retailers have drastically reduced
the number of catalogs
they send in snail mail to potential customers. With rising
postal fees and many people
using the Internet to make purchases, fewer and fewer of them
are waiting for the catalog
in the mail. By using predictive analytics, companies can weed
out people who are
unlikely to make catalog purchases and concentrate on those
who will. That decreases
marketing costs while increasing the ratio of catalogs to
purchasing customers.
Big Data Analytics
67. You’re shopping on a major retailer’s Web site when, all of a
sudden, you see a sweater
that you simply can’t live without. Alongside the sweater’s
display are pictures of a pair
of pants or skirt that, combined, will make the perfect outfit.
The pants and skirt are
labeled, “You might also like…” or “What other customers
purchased when they
purchased this sweater….”
Those extra items weren’t put there by chance but more as a
result of big data analytics
that we discussed in earlier chapters. Rather than requiring you
to thumb through pages
and pages of skirts and pants, the retailer will do it for you and,
in the meantime, increase
the chances of making an extra sale. Those recommendations
likely are a result of what
12-11
other customers purchased. The retailer captures all of its sales
data, analyzes it, and
includes data from social media streams to create the
68. customized recommendations.
Interactive Session: Technology: Big Data Make Cities Smarter
(see page 480 of the
text) describes how two major cities are using vast amounts of
data to improve
services for citizens and make city agencies more efficient.
Operational Intelligence and Analytics
Businesses are collecting millions of pieces of data on a
constant basis from sensors,
gauges, monitoring devices, and other technologies. The trick is
to make good use of the
data and turn it into information that employees and managers
can use to make better
decisions at the operational level of an organization.
Operational intelligence and analytics software gives
organizations the ability to analyze
all of the big data as they are generated in real time. The data
can feed dashboards for
employees or managers and give them a heads-up about
ongoing, real time operations.
69. Interactive Session: Management: America’s Cup: The Tension
Between
Technology and Human Decision Makers (see page 483 of the
text) describes how
Team USA used big data in real-time operation intelligence
mode to win the 2013
America’s Cup sailboat race. Ultimately, it was a balancing act
between technology-
driven decisions and human decision makers.
Location Analytics and Geographic Information Systems (GIS)
Many executive decisions depend on the availability of
information, internal and external.
For instance, a company that ships most of its products on
trucks needs data about
interstate highway access and traffic patterns to help control
shipping costs and make it
easier for drivers to access its warehouses. Some company
policies limit business
locations to high-traffic areas such as malls and similar densely
populated areas. Other
executive decisions revolve around data about current and
potential customers and their
70. geographic location.
Location analytics enable companies to gain insight from the
location component of
data, including data from mobile phones, wireless sensors,
scanning devices, location-
based cameras, and maps. The data may help businesses solve
problems, attract more
customers, or improve services.
Geographic information systems (GIS) rely heavily on
demographic data from the U.S.
Census Bureau. This type of decision-support system helps
managers visualize
geographic information more easily and make better decisions
based on digitized maps.
12-12
GIS data can be coupled with an organization’s internal data to
better allocate resources,
money, people, time, and material.
71. Management Strategies for Developing BI and BA Capabilities
Is it better to select a one-stop integrated solution for your
organization’s business
intelligence and business analytics systems or should you adopt
a multiple best-of-breed
vendor solution? Be aware that your decision carries risks and
rewards either way.
Single vendor: The risk is that your company becomes
dependent on the vendor’s pricing
power. The reward is that a single vendor promises hardware
and software that will work
together “out of the box.”
Multiple vendors: The reward is that you’ll have greater
flexibility and independence in
selecting your hardware and software. The risk is that you’ll
suffer compatibility issues,
not just between the BI hardware and software but with your
other systems as well.
You are locked into your decision and the switching costs are
extremely high regardless
of which way you decide to go.
72. As a manager you must:
business
Bottom Line: Business intelligence and business analytics
hardware and software
systems help businesses warehouse, integrate, report, and
analyze data from the
firm’s internal and external environment. BI and BA systems
provide employees,
managers, and executives with a wide variety of tools and
techniques that help them
make sense of all the data and ultimately make better decisions.
Each business must
decide whether a single vendor or multiple vendors will provide
the better system.
12.3 How do difference decision-making constituencies in an
organization use business intelligence? What is the role of
73. information systems in helping people working in a group make
decisions more efficiently?
At the beginning of this chapter we outlined the types of
decisions made at each
managerial level—structured, semistructured, and unstructured.
We also mentioned that
each management level has different information needs that
match the type of decisions
12-13
made at that level. Let’s look at the types of information
systems that match the
information needs.
Decision Support for Operational and Middle Management
For the most part, operational managers get their information
from transaction processing
systems. But, more and more, they are accessing management
information systems (MIS)
for a broader look at their company’s performance. Middle
management also relies on
74. MIS systems for the bulk of their information.
Here are the characteristics of a typical MIS system:
e flows of data
Support for Semistructured Decisions
Decision support systems help executives make better decisions
by using historical and
current data from internal information systems and external
sources of data. By
combining massive amounts of data with sophisticated
analytical models and tools, and
by making the system easy-to-use, they provide a much better
source of information to
use in the decision-making process.
Because of the limitations of hardware and software, early DSS
systems provided
75. executives only limited help. With the increased power of
computer hardware, and the
sophisticated software available today, DSS can crunch lots
more data, in less time, in
greater detail, with easy-to-use interfaces. The more detailed
data and information
executives have to work with, the better their decisions can be.
The “what-if” decisions most commonly made by executives use
sensitivity analysis
models to help them predict what effect the decisions will have
on the organization.
Executives don’t make decisions based solely on intuition. The
more information they
have, the more they experiment with different outcomes in a
safe mode, the better their
decisions. That’s the benefit of the models used in the software
tools.
Common spreadsheet software such as Microsoft’s Excel helps
managers review data in
two dimensions rather than just one by using pivot tables. They
can decipher patterns in
information and help them allocate resources better. Managers
using pivot tables can
76. develop better strategies because they’ll gain a better sense of
correlating data points.
Figure 12.6 shows you a typical screen used in a Microsoft
Excel pivot table.
12-14
Figure 12.6 A Pivot Table That Examines Customer Regional
Distribution and
Advertising Source
Decision Support for Senior Management: Balanced Scorecard
and
Enterprise Performance Management Methods
Executive support systems (ESS) are used primarily by senior
management whose
decisions are usually never structured and could be described as
“educated guesses.”
Executives rely as much, if not more, on external data than they
do on data internal to
their organization. Decisions must be made in the context of the
77. world outside the
organization. The problems and situations senior executives
face are very fluid, so the
system must be flexible and easy to manipulate.
Executive support systems don’t provide executives with ready-
made decisions. They
provide the information that helps them make their decisions.
Executives use that
information, along with their experience, knowledge, education,
and understanding of the
corporation and the business environment as a whole, to make
their decisions.
Using a balanced scorecard method, executives combine their
company’s internal
financial information with additional perspectives such as
customers, internal business
processes, and learning and growth. By focusing on key
performance indicators (KPIs)
in each of these areas, executives gain a better understanding of
how the organization is
performing overall. After senior management establishes KPIs
for each area, then and
78. only then can the flow of information be established. Figure
12.7 depicts the framework
for a balanced scorecard.
12-15
Figure 12.7 The Balanced Scorecard Framework
Business performance management (BPM) is yet another tool
for executives to
systematically translate the strategy they’ve developed for their
company into operational
targets. BPM methods use KPIs to help users measure the
organization’s progress toward
the targets. BPM is similar to the balanced scorecard approach
but with a stronger
strategic viewpoint than an operational viewpoint.
Executives often face information overload and must be able to
separate the chaff from
the wheat in order to make the right decision. On the other
hand, if the information they
79. have is not detailed enough, they may not be able to make the
best decision. An ESS can
supply the summarized information executives need and yet
provide the opportunity to
drill down to more detail if necessary.
As technology advances, ESS are able to link data from various
sources, both internal and
external, to provide the amount and kind of information
executives find useful. As
common software programs include more options and executives
gain experience using
these programs, they’re turning to them as an easy way to
manipulate information.
Because of the trend toward flatter organizations with fewer
layers of management,
companies are employing ESS at lower levels of the
organization. Flatter organizations
also require managers to access more information about a wider
range of activities than in
the past. This requirement can be accomplished with the aid of a
good ESS. Executives
can also monitor the performance of their own areas and of the
80. company as a whole.
Group Decision-Support Systems (GDSS)
More and more, companies are turning to groups and teams to
get work done. Hours upon
hours are spent in meetings, in group collaboration, in
communicating with many people.
12-16
To help groups make decisions, a new category of systems was
developed: the group
decision-support system (GDSS).
You’ve been there—a meeting where nothing seems to get done,
where some people
dominate the agenda and others never say a word, and it
dragged on for hours. When it
was all over no one was sure what was accomplished, if
anything. But the doughnuts and
coffee were good! Organizations have been struggling with this
problem for years. They
are now using GDSS as a way to increase the efficiency and
effectiveness of meetings.
81. In GDSS, the hardware includes more than just computers and
peripheral equipment. It
also includes the conference facilities, audiovisual equipment,
and networking equipment
that connect everyone. More sophisticated GDSS require
meeting facilitators and other
staff that keep the hardware operating correctly. Many
companies are bypassing specially
equipped rooms in favor of having group participants “attend”
the meeting through their
individual desktop computers.
Now instead of wasting time in meetings, people will know
ahead of time what is on the
agenda. All of the information generated during the meeting is
maintained for future use
and reference. Because input is anonymous, ideas are evaluated
on their own merit. And
for geographically separated attendees, travel time and dollars
are saved.
GDSS are best used for tasks involving:
82. Bottom Line: Executive support systems meet the needs of
corporate executives by
providing them with vast amounts of information quickly and in
graphic form to
help them make effective decisions. ESS must be flexible, easy-
to-use, and contain
both internal and external sources of information. The balanced
scorecard method
expands the view of the organization to include four
dimensions: financial, business
process, customer, and learning and growth. Group decision-
support systems,
comprised of hardware, software, and people, help streamline
group meetings and
communications by removing obstacles and using technology to
increase the
effectiveness of decisions.
83. 11-1
Chapter 11 Managing Knowledge
“When people leave organizations today, they are potentially
taking with them knowledge
that’s critical to the future of the business,” says David
DeLong, a business consultant and
author of Lost Knowledge: Confronting the Threat of an Aging
Workforce. Whether it’s a
key client relationship, mastery of an outdated computer
language, or simply knowledge
about where certain files are saved on a company server, every
business has stored up bits
of information and knowhow that isn’t written in a manual or
recorded in a training
video.” (BusinessWeek.com, “The Knowledge Handoff,”
Douglas McMillian, Aug 26,
2008)
As we’ve mentioned in other chapters, information, therefore
knowledge, is becoming an
important corporate resource that must be captured, protected,
preserved, and grown.
How you do that is the focus of this chapter.
84. 11.1 What is the role of knowledge management and knowledge
management programs in business?
Creating and using knowledge is not limited to information-
based companies; it is
necessary for all organizations, regardless of industry sector.
It’s not enough to make
good products. Companies must make products that are better,
less expensive to produce,
and more desirable than those of competitors. Using corporate
and individual knowledge
assets wisely will help companies do that. They must harness as
much knowledge as they
can and make it easy to share with others.
Important Dimensions of Knowledge
We discussed the difference between data and information in
previous chapters. The next
step up from information literacy is knowledge. An organization
must transform the
information it gathers and put it into meaningful concepts that
give it insight into ways of
85. improving the environment for its employees, suppliers, and
customers. Wisdom then is
using information to solve problems and knowing when, where,
and how to apply
knowledge.
You may have associated with the long-time employee that
seems to know how to fix the
intricate piece of machinery in his sleep. He’s been doing it for
years, he would tell you.
All of the knowledge he retains in his mind is tacit knowledge.
On the other hand, you
may have dealt with an employee who seems to grab the
operating manual every time he
turns around. The manual is an example of explicit knowledge—
that which is
documented.
Table 11.1 below shows that every organization has four
dimensions of knowledge:
11-2
86. How it handles them is what can make the organization a
successful one that seems to
outrun the competition, or one that seems to muddle through the
best it can. Examine
your organization and determine how well it values its
knowledge.
Organizational Learning and Knowledge Management
In the last few years, companies have downsized and flattened
their organizations. Many
employees who were laid off had been with these companies for
years. When they walked
out the door, they took experience, education, contacts, and
information with them.
Companies are finding out how important human resources are
to their success and are
87. 11-3
establishing organizational learning mechanisms to capture and
use this corporate
knowledge.
That is, organizations gain experience by:
es
Successful organizations then incorporate what they’ve learned
into new business
processes and new management decision-making skills.
The Knowledge Management Value Chain
To understand the concept of knowledge management, think of
knowledge as a
resource, just like buildings, production equipment, product
designs, and money. All
88. these resources need to be systematically and actively managed.
Figure 11.1: The Knowledge Management Value Chain
Figure 11.1 shows you the activities that go into successfully
managing knowledge from
acquiring it to applying it throughout the firm. It’s not just
technology related to the
activities that’s important to recognize. In fact, as the text
points out, technology
applications of managing knowledge account for only about 20
percent. The other 80
percent deals with organizing and managing the knowledge
assets.
Knowledge Acquisition
11-4
Figure 11.1a: Acquiring Knowledge
89. Knowledge comes from a variety of sources. Early attempts of
gathering knowledge were
a hodgepodge of documents, reports, and employee input. Now
companies are using more
sophisticated technologies to gather information and knowledge
from e-mails,
transaction-processing systems, and outside sources such as
news reports and government
statistical data. It’s important to remember that a great deal of
knowledge should come
from external sources because no organization exists in a
vacuum.
Knowledge Storage
Figure 11.1b: Storing Knowledge
Remember, knowledge management is a continual process, not
an event. As you gather
knowledge you must store it efficiently and effectively.
Document management systems
are an easy way to digitize, index, and tag documents so that
employees can retrieve them
without much difficulty. Probably the most important element
of any knowledge system
90. is the people that feed the machine. One of the biggest reasons
knowledge systems have
failed in the past is because the employees and management
either didn’t place enough
importance on the system or felt threatened by it. All the people
in the digital firm need to
realize how important a resource knowledge is and help take
care of the system.
11-5
Knowledge Dissemination
Figure 11.1c: Disseminating Knowledge
Once you’ve built the system, acquired and stored the
knowledge, you need to make it
easy and efficient for employees to access the knowledge.
Portals, wikis, social networks,
IM, and e-mail are just some of the tools you can use to
disseminate information easily
and cheaply. Everyone complains nowadays of having too much
information. The
91. organization needs to make knowledge dissemination
unobtrusive and easy to master or
the employees and managers will ignore it or underutilize it.
Knowledge Application
Figure 11.1d: Applying Knowledge
You can have all the information and knowledge you need to
master any task, but if you
don’t build knowledge application into every functional area
and every system used
throughout the organization you are doing a disservice to both
the knowledge and the
company. As old systems are revamped and revised or new ones
built, pay attention to
how you can draw knowledge into them. The digital firm also
needs to explore how it can
use the knowledge system to build new processes for its
employees and suppliers, or new
products for its customers. Once it masters that, it can outrun
the competition and build a
stronger organization.
92. Building Organizational and Management Capital:
Collaboration, Communities of
Practice, and Office Environments
As knowledge becomes a central productive and strategic asset,
the success of the
organization increasingly depends on its ability to gather,
produce, maintain, and
disseminate knowledge. One way companies are responding to
the challenge is by
appointing a chief knowledge officer. His/her responsibilities
involve designing new
programs, systems, and methods for capturing and managing
knowledge. In some cases,
the hardest part of the CKO’s job may be convincing the
organization that it needs to
capture, organize, and use its corporate knowledge to remain
competitive.
11-6
Basically, the CKO concept is rooted in the realization that
companies can
93. no longer expect that the products and services that made them
successful
in the past will keep them viable in the future. Instead,
companies will
differentiate themselves on the basis of what they know and
their ability to
know how to do new things well and quickly. (copied from
Business.com
Web site, Nov 2008)
No one person has all the knowledge a digital firm needs. For
that you must rely on many
different people from many different locations. Communities of
practice (COP) are
built on the idea of combining ideas and knowledge from
various sources and making it
available to people inside and outside the organization.
Professional conferences,
newsletters, journals, and online newsgroups are excellent
sources of information that
center on the communities of practice concept.
Four areas where COP can make a difference are:
94. t as a spawning ground for new knowledge
Types of Knowledge Management Systems
Let’s look at three major types of knowledge management
systems as shown in Figure
11.2.
Figure 11.2: Major Types of Knowledge Management Systems
Enterprise-wide knowledge management systems are spread
across the organization
and offer a way to systematically complete the information
system activities we just
reviewed: acquiring, storing, disseminating, and applying
knowledge.
11-7
95. Knowledge work systems use powerful workstations that can
process the huge graphics
files some professionals need or to perform the massive
calculations other types of
professionals require. We’re not talking clip art or simple
addition or subtraction. We’re
talking huge amounts of data that must be processed quickly and
the necessary storage
capacity for large files. The workstations must also have the
necessary equipment and
telecommunication connections that enable the knowledge
workers to connect to external
sources of information via extranets, intranets, or the Internet.
These systems must have
system and application software that is easy-to-use and
manipulate, and intuitive to learn
so the workers can “get right to it.”
Intelligent techniques, which we’ll look at more closely at the
end of this chapter,
include expert systems, neural networks, and genetic
algorithms, to name a few.
Bottom Line: Knowledge is an important asset that must be
managed throughout
96. the enterprise. Knowledge must be acquired, stored, distributed,
and applied
effectively and efficiently. The chief knowledge officer is
responsible for ensuring
that the digital firm uses its knowledge assets wisely.
Communities of practice help
people reuse knowledge easily and cheaply.
11.2 What types of systems are used for enterprise-wide
knowledge management and how do they provide value for
businesses?
There are three primary types of knowledge in every
organization:
or
presentations
-mails, videos, digital pictures, or
brochures
With so many sources of information and knowledge available,
how does an organization
go about collecting, storing, distributing, and applying all of it?
97. That’s what we’ll
investigate in this section.
Enterprise Content Management Systems
Traditionally, knowledge wasn’t considered a corporate
resource. Many systems were
built without the necessary infrastructure for gathering, storing,
and retrieving knowledge.
That began changing in the 1990s when companies started
realizing how much
knowledge was lying dormant in text documents and reports.
The structured knowledge
systems were the first attempts at capturing this type of
knowledge and making it easily
available to a wider range of people inside the organization.
11-8
As people started using newer forms of communications such as
e-mails, chat rooms,
voice mail, and digital-based reports, graphics, and
presentations, organizations had to
98. adapt their systems to accommodate the semistructured
knowledge. Enterprise content
management systems are designed to piggyback on the more
rigidly structured
knowledge systems to incorporate a wider range of information.
Centralized knowledge
repositories include information from the structured and
semistructured knowledge
systems. The knowledge repository is then easily accessed by
employees throughout the
organization and can also be properly managed by the CKO.
Before you get all the data, information, and knowledge into
your enterprise content
management system, you need to create a taxonomy that will
help organize the
information into meaningful categories. That makes it easy to
find things later on. For
example, you have lots of digital renderings of your company
logo. Set up a taxonomy
called “Logo.” Now, whenever you add another digital file of a
logo, you tag it with the
taxonomy.
99. For those firms whose knowledge is contained in objects other
than simple documents,
digital asset management systems help them collect, store, and
process knowledge
contained in photographs, graphic images, videos, and audio
files.
Locating and Sharing Expertise
Because it’s simply too expensive and too time-consuming to
continually reinvent the
wheel, corporations are turning to enterprise content
management systems and systems
for collaboration and social business in an attempt to link those
who hold the knowledge
with those that need the knowledge. Employees who have the
tacit knowledge about a
product or project in their head are easily connected with
employees who need to know
the information through these kinds of networks. Corporations
save time and money by
placing data pertaining to the subject matter experts in a
directory that all employees can
access. Users are easily connected to the experts through these
networks and can