SlideShare a Scribd company logo
EXPLORING THE USE OF GROUNDED THEORY
AS A METHODOLOGICAL APPROACH TO
EXAMINE THE 'BLACK BOX' OF NETWORK
LEADERSHIP IN THE NATIONAL QUALITY
FORUM
A. BRYCE HOFLUND
University of Nebraska at Omaha
ABSTRACT
This paper describes how grounded theory was used to
investigate the
“black box” of network leadership in the creation of the
National
Quality Forum. Scholars are beginning to recognize the
importance of
network organizations and are in the embryonic stages of
collecting and
analyzing data about network leadership processes. Grounded
theory,
with its focus on deriving theory from empirical data, offers
researchers
a distinctive way of studying little-known phenomena and is
therefore
well suited to exploring network leadership processes.
Specifically, this
paper provides an overview of grounded theory, a discussion of
the
appropriateness of grounded theory to investigating network
phenomena, a description of how the research was conducted,
and a
discussion of the limitations and lessons learned from using this
approach.
Keywords: grounded theory, network leadership, health care,
network
organization, collaboration
470 JHHSA SPRING 2013
It is a capital mistake to theorize
before one has the data.
- Sherlock Holmes
The task of scientific study is to lift the veils
that cover the area of life that one proposes to study.
-- Blumer
(1978)
Generating a theory involves a process of research.
--Glaser and
Strauss (1967)
In The Rise of the Network Society (2000), the first
in a trilogy of books about the social, economic, and
cultural impacts of the Information Age, sociologist
Manual Castells documents the rise of the Information Age.
A defining feature of this new age is interconnectedness,
which is manifested through the complex networks that are
a ubiquitous part of the Information Age. Networks are
everywhere; there are, among other things, global business
networks, cellular networks, television networks, social
networks, the Internet, and computer networks.
In the public sector we also are witnessing the
movement away from bureaucratic, hierarchical
organizations toward networks. Rubin (2005) argues that
the three-branch metaphor for government is outmoded and
that the network metaphor more accurately describes
government and intergovernmental relations today.
Goldsmith and Eggers (2004) note that this shift has
occurred for a number of reasons, including an increase in
cross-agency and cross-government initiatives, an increase
in public-private collaboration, and the growth of the
Digital Revolution, which allows for increased citizen
demand for and input in service delivery options.
JHHSA SPRING 2013 471
In 1999 the health care industry created the National
Quality Forum (NQF), a network organization, whose
founding mission was to improve American healthcare
through endorsement of consensus-based national standards
for measurement and public reporting of healthcare
performance data that provide meaningful information
about whether care is safe, timely, beneficial, patient-
centered, equitable and efficient.
The NQF was created because of all of the failed
attempts in health care to make some headway in quality
improvement. The NQF is representative of a network
organization because it was created to address issues of
health care quality in a new way by bringing together
organizations from the public and private sectors and
providing them with a forum to discuss and debate
measures of quality, and ultimately, to effect change. The
NQF thus represents a major administrative experiment in
addressing health policy issues.
Dr. Kenneth W. Kizer, as the NQF’s first leader,
was tasked with building the network. This makes network
leadership important. Since there were so few empirical
studies into the phenomenon of network leadership, a
grounded theory approach seemed to be the most
appropriate way to study the “black box” of network
leadership. The purpose of this paper is to provide some
insight into how to conduct an empirical study of network
leadership using a grounded theory approach and considers
some of the strengths, limitations, and lessons learned from
this application of grounded theory. I argue that grounded
theory offers a powerful and promising approach way of
studying such social phenomena as network leadership. It is
important to note that this paper does not present the
findings from this study of network leadership since they
have been published elsewhere (see Hoflund & Farquhar,
2008; Hoflund, 2012a, Hoflund, 2012b).
472 JHHSA SPRING 2013
This paper is organized into three sections. First, I
discuss the research design and strategy for this study,
including a brief overview of the history and nature of
grounded theory and its usefulness as an approach for
studying networks and leadership. Secondly, I discuss data
collection and data analysis. In Part Three, I conclude by
discussing some of the limitations and lessons I learned
from conducting research using a grounded theory
approach.
RESEARCH DESIGN
Since I was interested in exploring the phenomenon
of network leadership, I used a qualitative research design
and, more specifically, a grounded theory approach to
conduct this study about network leadership during a
network organization’s formative stages. A qualitative
research design is most appropriate for this study because it
provides the best means to explore complex processes and
investigate “little-known phenomena or innovative
systems” such as network leadership, and it is useful when
“relevant variables have yet to be identified” as is the case
with the critical tasks related to network leadership
(Marshall & Rossman, 1999, p. 57).
A qualitative approach also allows one to describe
the “naturally unfolding program processes and impacts”
and allows for a certain richness in the research—the
participants’ thoughts, opinions, and experiences are
captured in their own words—that one may not be able to
get through the use of another approach (Patton, 1987, p.
14). That is, a qualitative approach allows one to “lift the
veils” surrounding an area of study.
But this does not mean that this type of research
does not follow a process. In fact, it is quite the opposite.
Grounded theory allows researchers to follow a process that
allows for creativity in discovering and understanding
JHHSA SPRING 2013 473
social processes and phenomena (Glaser & Strauss, 1967). I
first discuss the origins and philosophical underpinnings of
grounded theory and, in the following sub-section, the
benefits of a grounded theory approach and justification for
why I employed this approach to study network leadership.
Grounded Theory’s Origins and Philosophical
Underpinnings
Glaser and Strauss (1967) state that grounded
theory is the “discovery of data systematically obtained
from social research” (p. 2). Creswell (2003) elaborates on
their definition by noting that grounded theory is a strategy
“in which the researcher attempts to derive a general,
abstract theory of a process, action, or interaction grounded
in the views of participants in a study” (p. 14).
Glaser states that grounded theory is useful to
“researchers and practitioners in fields that concern
themselves with issues relating to human behavior in
organizations, groups, and other social configurations”
(Glaser, 1992, p. 13). The nature of grounded theory is to
ensure that the theory being generated will “fit” the
situation being studied and that it will “work” in terms of
describing the behavior being observed (Glaser & Strauss,
1967, p. 3). It follows from this, then, that for theory to be
useful for understanding social phenomena and behavior,
the best way to develop theory is to “ground” it in data.
In using the grounded theory method to develop
theory, one begins with an area of study and allows what is
relevant to that area to emerge from the data. Two key
characteristics define grounded theory: a de-emphasis on
the verification of theory and an emphasis on the
generation of theory. Glaser and Strauss (1967) proposed
grounded theory as a way to counteract the preoccupation
with the verification of theory in both qualitative and
quantitative research that had dominated social science
since the 1940s, to address some of the weaknesses of
474 JHHSA SPRING 2013
qualitative theory, and to allow for the development of
theory that would be meaningful to both practitioners and
scholars.
Glaser and Strauss (1967) argued that scholars were
too concerned with verifying the “grand theories” bestowed
on us by “great men” such as Marx, Weber, and Durkheim.
After World War II, there was significant growth in the
development and distribution of quantitative methods (e.g.,
survey research) that could be used to test and verify these
theories. In The Discovery of Grounded Theory, Glaser and
Strauss (1967) offer a polemic against Robert Merton and
the positivist approach:
His reasoning necessarily leads to the
position that data should fit the theory, in
contrast to our position that the theory
should fit the data [emphasis in the original]
(p. 261).
While grounded theory acknowledges that verification of
theory is important, it argues that this task should be
subordinate to the generation of theory.
Glaser and Strauss (1967) also proposed grounded
theory as a way of strengthening qualitative research. They
argued that qualitative approaches suffered from an
overemphasis on verification, but more importantly were
increasingly labeled as “impressionistic” and criticized for
not being rigorous or systematic enough. On the other
hand, quantitative methods were seen as rigorous and
“more scientific.” As a direct result of this, over time,
quantitative methods gradually usurped qualitative
approaches to studying and gaining insight about social
phenomena.
With the publication of The Discovery of Grounded
Theory, however, Glaser and Strauss tried to formalize and
systematize “grounded” theory, and qualitative methods
JHHSA SPRING 2013 475
more generally, as a legitimate form of inquiry into social
phenomena. What was unique about their approach,
however, was that they did not discount the importance and
benefits of scientific rigor that had been so lauded in
quantitative research:
It is vital to note that the fundamentals of
Grounded Theory, the underlying analytic
methodology, are in very large measure
drawn from the analytic methodology and
procedures of inductive quantitative analysis
laboriously discovered by researchers and
students in the Department of Sociology and
the Bureau of Applied Social Research at
Columbia University in the 1950’s and
1960’s (Glaser, 1992, p. 7).
Perhaps the most important difference to note
between grounded theory and other approaches to
qualitative research is grounded theory’s emphasis on
theory development. Glaser and Strauss (1967) argue that
the growth of positivism and the emphasis on verification
of theory rather than generation of theory resulted in a
significant gap between theory and empirical research.
Theory that was “grounded” in data, they proposed, would
contribute toward “closing the embarrassing gap between
theory and empirical research” (Glaser & Strauss, 1967, p.
vii).
During the past thirty-five years, researchers from a
variety of different disciplines, including psychology,
information science, education and health care, have used
grounded theory as a means of exploring social
relationships and phenomena.
476 JHHSA SPRING 2013
Grounded Theory as a Means of Exploring Network
Leadership
Scholars argue that new methods are required to
research and understand new organizational forms such as
network organizations. Daft and Lewin (1993) note the
trend away from bureaucratic, hierarchical structures
toward more loosely coupled, flexible structures that
emphasize learning. They contend that in order for
managers to function in this new environment and for
researchers to understand this new environment, these
emergent forms of organization, which include network
organizations, require new forms of empirical investigation
(Daft & Lewin, 1993). This new form of investigation,
according to Daft and Lewin (1993), “will be characterized
by midrange theory and method, grounded research, and
research that does not presume to test hypotheses” (p. ii).
Daft and Lewin (1993) argue that the primary benefit of a
grounded theory approach to emergent organizational
structures is:
A midrange, grounded study of some part of
a new organizational form would enable a
scholar to learn firsthand about it and
provide new theory. We are proposing a role
for organizational scholars that is primarily
one of developing new variables and
theories to describe new phenomena, not to
test hypotheses. If done well, the emerging
knowledge will advance both organization
theory and the practice of management (p.
iii).
More recently, other scholars, including McGuire and
Agranoff (2007) and Agranoff (2004), have explored the
relevance of grounded theory as an approach to studying
networks, noting that employing grounded theory will help
JHHSA SPRING 2013 477
answer some of the “big questions” about network
management by allowing researchers to delve more deeply
into the “black box” of networks and examine them from
the inside out.
Scholars also contend that leadership theory would
be enhanced by the generation of theories that are
“grounded” in what leaders are actually doing (Parry,
1998). The applicability of grounded theory to leadership
has been demonstrated in a number of studies (Hunt, 1991;
Hunt & Ropo, 1995). Hunt and Ropo (1995) argue that
grounded theory can be effective as a means of studying
social processes, such as leadership because “grounded
theory emphasizes dynamism, whereas mainstream analysis
emphasizes static structure” (p. 381). Therefore, grounded
theory allows one to understand the dynamic of “change”
as it relates to leadership, as opposed to traditional
approaches, which study leadership at one point in time. As
a result of the focus on quantitative methods, there have
been increased calls issued for more qualitative work on
leadership (e.g., Bryman, Stephens, & a Campo, 1996;
Parry, 1998).
For this research, the choice of grounded theory as a
strategy of inquiry was appropriate for several reasons.
First, this is an exploratory study in that its purpose is to
generate theory about network leadership strategies that is
grounded in empirical evidence. Eisenhardt (1989) notes
one of the strengths of grounded theory is it “produces
theory which closely mirrors reality” (p. 547). The nature
of grounded theory is to move from observations to the
development of concepts then to theory development
(Locke, 2001). Theory building grounded in empirical
evidence promises to contribute to the scholarly literature
in public administration and organizational theory, but at
the same time be “useful to practitioners in the settings
studied, providing them some understanding and control
478 JHHSA SPRING 2013
over situations they encounter on a daily basis” (Locke,
2001, p. 18).
The use of grounded theory also was appropriate
because the network leadership literature is
underdeveloped; the theories related to network
management that do exist were not systematically obtained
from observations and may lack validity. Thus, more
empirical studies need to be conducted (Agranoff &
McGuire, 2001). The emergent theory is more likely to be
empirically valid because the theory building process is so
closely linked with empirical observations.
DATA COLLECTION AND ANALYSIS
Grounded theory is an iterative process during
which there is interplay among data collection, analysis and
theory generation. Glaser and Strauss (1967) refer to this as
the constant comparative method of analysis. The idea
behind the constant comparative method is that a researcher
gathers data, analyzes the data, and compares them against
previously collected data in order to determine variables
and uncover emerging relationships between variables and
categories.
The overlap of data collection and data analysis
serves several purposes. First, it allows the researcher to
move ahead with data analysis during the data collection
stage. Second, it permits researchers to be flexible with
regard to things that might emerge from the data. For
example, Eisenhardt (1989) notes that it enables one to
make adjustments to the data collection instruments that
“allow the research to probe emergent themes or to take
advantage of special opportunities which may be present in
a given situation” (p. 539). Finally, the constant
comparative method serves as a source of validity because
the process generates further data and knowledge, leading
JHHSA SPRING 2013 479
to theory that is more reliable because it is more clearly
defined and less abstract (Parry, 1998).
In the following sub-sections, I discuss how I
conducted this research. In keeping with the tenets of
grounded theory, I have not separated data collection and
analysis into separate sections; instead, I discuss them
jointly. I begin by discussing the types of data or “data
slices” that Glaser and Strauss (1967) recommend
collecting to develop grounded theory. I then discuss the
six phases of this research in light of the techniques Glaser
and Strauss (1967) discuss and Strauss and Corbin (1998)
elaborate on for collecting, organizing and analyzing these
data slices and developing theory that is truly “grounded”
in the data.
Data Slices: Interviews, Field Notes, Observations and
Documents
Glaser and Strauss (1967) advocate gathering
“slices of data”—which others refer to as “triangulation”—
as a means of understanding conceptual categories from
different vantage points. Caudle (1994, p. 89) defines
triangulation as “the combining of methods, data sources,
and other factors in examining what is under study” in
order to determine whether or not they are congruent and/or
complementary. The nature of this research was to uncover
recurring patterns and to describe the administrative
processes, activities, and resources involved in the
development of standards in a network setting. Grounded
theory, as distinguished from other forms of qualitative
research such as phenomenology, demands that researchers
consider multiple forms of data (Suddaby, 2006). In order
to develop theory that takes into account multiple
perspectives and different types of data, I collected data
from a variety of sources, including one-on-one interviews,
field notes, observations and NQF-related documents.
480 JHHSA SPRING 2013
Interviews. Thirty-nine interviews informed this research.
Of these, I conducted semi-structured interviews with 21
individuals who were active in the NQF during its
formative years. Of the 25 people I contacted, 19 agreed to
an interview, three said no (one gave no reason for saying
no, the other two individuals said that s/he was too busy
and his/her agency would not allow him/her to be
interviewed), two did not respond, and one referred me to
another person, who I interviewed. A colleague also was
conducting her research about the NQF. Since both of our
studies were investigating aspects of the NQF as a network
organization and our lines of questioning and interview
protocol were similar, she and I shared the interviews that
we had conducted and transcribed. She shared 18
interviews with me. I analyzed and coded these as I did my
own interviews. Strauss and Corbin (1998) refer to this type
of sharing and coding data sets “secondary analysis” and
state a “researcher building theory can code these materials
as well, employing theoretical sampling in conjunction with
the usual coding procedures” (p. 213).
Glaser and Strauss (1967) recommend theoretical
sampling of different groups to maximize the similarities
and differences of information. Therefore, the interviewees
were representative of the diverse organizations that belong
to the NQF and consisted of individuals who were involved
at all levels of the NQF, including NQF staff members, and
those who served on the Board of Directors, the Never
Events Steering Committee and each of the four Member
Councils (Consumers, Purchasers, Providers, and Research
and Quality Improvement Organizations).
The interviewees initially were contacted by phone
or e-mail about participating in the study. Whether by
phone or e-mail, I introduced myself, provided them with
information about the project, and asked them if they would
be willing to participate in an interview. The interviews
occurred either by phone or in person. Each interview
JHHSA SPRING 2013 481
lasted approximately one hour, and, in many cases, quite a
bit longer. In order to ensure anonymity, I have not
divulged the names of the individuals I interviewed or
mentioned their names or positions in the text. I gathered
additional contacts using snowball or chain sampling. In
snowball sampling, interviewees are asked to provide other
names of individuals who know about the issue (Caudle,
1994).
Different stages of theory development demand
different interview techniques (Polit & Beck, 2004;
Wimpenny & Gass, 2000). Glaser and Strauss (1967) state
that during the initial period of data collection and analysis,
interviews may take the form of unstructured conversations
and, as the theory begins to emerge from the data, the
interviews will become more focused and structured.
During the initial phases of my data collection, the
interviews tended to be more conversational and broadly
focused and I developed an initial interview guide that
reflected this. As the theory began to emerge, I developed
an interview guide in which the questions were more
focused than they were initially. The interviews themselves
became more structured. Fielding (1994) notes that some of
the strengths of semi-structured interviews are that they
allow the researcher to ask questions in the same way each
time, while allowing for flexibility in the sequence of
questions and the depth of exploration.
Throughout the process, I taped and transcribed
each of the interviews after asking a subject for his or her
consent. All of the interviewees consented to being taped.
After I completed each interview, I transcribed it into an
MS Word document and uploaded it into QSR N6.
Richards and Richards (1994) maintain that software such
as QSR N6, NVivo, and Atlas/ti is essential to maintaining
precision and rigor in data analysis. After I uploaded the
interview into QSR N6, I began coding it; I elaborate on
this process in later sections.
482 JHHSA SPRING 2013
The one-on-one interviews not only allowed me to
gather information about the specific management
strategies the NQF used to manage the development of
standards but also permitted me to observe the body
language and tone of voice of the network managers and
members and the physical setting of the NQF. From the
interviews I gleaned quotes and gathered opinions and
information about how the participants interacted within
the network. I used “memoing” to record thoughts,
interpretations, questions and directions for further data
collection (Strauss & Corbin, 1998). These memos were
written to explore what was emerging from the data, what I
was learning from the literature, and how I linked the two
in developing an interview guide and theory.
Field notes. Field notes are an important part of grounded
theory research because they allow a researcher to record
observations and thoughts about the research process and
topic as the research progresses. Eisenhardt (1989)
recommends writing down impressions and asking such
critical questions as “What am I learning?” and “How does
this case differ from the last?” after interviews and
observations.
I kept two types of field notes: a set for interviews
and a set of notes outlining what I observed at the two NQF
Annual Meetings I attended. As part of the interview
process, I kept records of notes that I took during the
interviews. I also took time immediately after I completed
each interview to record my impressions and thoughts
about what I learned from the interview. While attending
the NQF Annual Meetings, I took notes about the issues
discussed at the meetings, differing opinions and who
raised them, Kizer’s representation of the NQF, and my
reactions to and thoughts about various events and topics
discussed.
JHHSA SPRING 2013 483
Written documents. I also gathered and analyzed documents
related to the NQF, including working papers about the
NQF’s first project—the “Never Events” project—minutes
from committee meetings, and briefing materials. In order
to gain access to these documents, I contacted the NQF’s
staff members and executive officers involved in
overseeing the “Never Events” project as well as
individuals involved in the development of the consensus
report. A confidential source close to the NQF also
provided me with many financial and other documents
pertaining to the NQF’s creation and the Never Events
project. I also collected data from public sources, including
newspaper and journal articles, speeches Kizer gave that
were available on the Internet and information from the
NQF’s web site.
One can learn a great deal about the organizational
structure, operations, history and philosophy of an
organization through the examination of written
documents, and these documents provided me with a strong
sense and appreciation of the NQF as an organization. I
used these documents to provide me with information about
reports I might want to obtain and the individuals I might
want to contact for interviews during the initial stages of
my research.
Observation. I also attended and observed the proceedings
of two NQF Annual Meetings. I attended the two meetings
for several reasons. First, they gave me an opportunity to
observe first-hand how the NQF conducts business.
Second, I was able to meet people and question them
informally about the NQF at these meetings. Third, as the
research progressed and leadership became the focal point
of the study, the meetings gave me a chance to observe
Kizer in action and determine whether what I was
observing matched with what I was hearing from the
interviewees. Finally, the annual meetings gave me a
484 JHHSA SPRING 2013
chance to learn about and keep up-to-date on the various
issues affecting the NQF and its operations.
The Research Phases: Collecting, Analyzing and
Developing Theory
Glaser and Strauss (1967) do not prescribe how to
conduct research using the grounded theory method in their
seminal work. Strauss and Corbin (1998), however,
elaborate on the original work and outline some steps for
conducting research using grounded theory: open coding,
axial coding, and selective coding. Strauss and Corbin
(1998) state that the process is “a free-flowing and creative
one in which analysts move quickly back and forth between
types of coding, using analytic techniques and procedures
freely and in response to the analytic task before analysis”
(p. 58). Since I was new to grounded research, I followed
the approach outlined by Strauss and Corbin (1998). I
conducted this research in six phases and delineate the
tasks I undertook for each phase of the data collection and
analysis process in the following sections.
Phase one: Initial contact with the NQF and immersion in
the health care literature. I began the project by
establishing contact with NQF staff and Dr. John
Eisenberg, then Director of the Agency for Healthcare
Research and Quality (AHRQ)—which provided some of
the initial funding for the NQF. I read widely about the
health care system, including the history of health care in
the United States (Starr, 1984; Millenson, 1997); the
history of quality improvement efforts (Brennan &
Berwick, 1996); quality problems in health care
(President’s Advisory Commission, 1998; Institute of
Medicine, 1999, 2001), including research and information
about medical errors and patient safety (Bogner, 1994) and
quality initiatives underway in the health care industry. I
also read about high-reliability systems and human error
JHHSA SPRING 2013 485
(Perrow, 1999; Reason, 1990) and error-reporting systems
and quality improvement efforts underway in other
industries, including the aviation, nuclear and chemical
industries (Rees, 1994; Gunningham & Rees, 1997).
Phase two: Literature review and development of initial
research questions. During Phase Two, I narrowed the
focus of my study to the NQF and its role as a network
organization charged with coordinating quality
improvement efforts in the health care industry. I also
began to read literature about networks and network
management. One of the common misperceptions about
grounded theory is that a researcher should come into the
research as a “blank slate” with no prior immersion in or
knowledge about the literature (Suddaby, 2006, p. 634).
However, Glaser and Strauss (1967) argue for a link
between substantive theory, or the theory associated with a
particular subject area, and the generation of grounded
formal theory:
We believe that although formal theory can
be generated directly from the data, it is
more desirable, and usually necessary, to
start the formal theory from a substantive
one. The latter not only provides a stimulus
to a ‘good idea’ but it also gives an initial
direction in developing relevant categories
and properties and in choosing possible
modes of integration. Indeed it is difficult to
find a grounded formal theory that was not
in some way stimulated by substantive
theory (p. 79).
From this literature review, I identified the broad
questions that guided the research questions during the
preliminary phases of this project: (1) how are these new
486 JHHSA SPRING 2013
organizational forms (i.e., networks) managed? and (2)
what is the U.S. national government’s role in this process?
While these two questions outlined the broad purpose of
this study, I developed the following questions to guide me
initially as I gathered specific information about the NQF:
1. How and why was the NQF created?
2. How is the NQF organized?
3. How does the NQF manage the
development of standards?
4. What is the federal government’s role in
this process?
5. What lessons does NQF’s administrative
experiment hold for students of public
administration?
From my initial literature review and document
collection efforts, I developed a preliminary interview
guide that I used for conducting the initial exploratory
interviews. Since the process was exploratory, the
interview questions served as probes to generate data that I
later tied-back to the existing literature during Phase Three.
Phase three: Initial interviews and identification of the
emergent themes through open coding. During Phase
Three, I conducted, coded, and began to analyze the initial
exploratory interviews and continued collecting documents
related to the NQF. I interviewed seven individuals
involved in the “Never Events” project.
Strauss and Corbin (1998) state that the first step in
the process of theory building is the development of
concepts. The initial interviews allowed me to begin the
process of organizing and interpreting the data. Open
coding is the “process through which concepts are
identified and their properties and dimensions are
discovered in data” (Strauss & Corbin, 1998, p. 101).
JHHSA SPRING 2013 487
During open coding, “data are broken down into discrete
parts, closely examined, and compared for similarities and
differences” (Strauss & Corbin, 1998, p. 102). The process
enables researchers “to group similar events, happenings,
and objects under a common heading or classification”
(Strauss & Corbin, 1998, p. 103). Researchers can analyze
documents by line, by sentence or paragraph, or as a whole
(Strauss & Corbin, 1998). From there, categories are
identified and their properties and dimensions are specified
(Strauss & Corbin, 1998).
To assist me with the coding process, I used QSR
N6. One of the strengths of using qualitative software is
that it allows the themes to emerge from the interviews. As
I coded the interviews sentence by sentence, I began to pull
common themes from them and group them into broad
categories. As I coded these interviews, the broad theme of
leadership and, more specifically, Kizer’s leadership in
creating and building the NQF, consistently emerged.
Since the NQF was a relatively new organization, I
began to think about the role of a leader in building a
network organization. I developed the following question to
guide me: “What are some of the key tasks a leader
engages in to create a network organization?” Since I had
initially started the research with a broad area for
investigation, network management, asking these questions
effectively allowed me to narrow the scope and focus of my
research and to develop a more finely tuned research
question. This is in keeping with Strauss and Corbin
(1998), who state, “Although the initial question starts outs
broadly, it becomes progressively narrowed and more
focused during the research process as concepts and their
relationships are discovered” (p. 41).
One way to investigate phenomena and develop
sensitivity or insight into the data and the concepts being
developed is to examine the literature for relevant
information (Strauss & Corbin, 1998). Eisenhardt (1989)
488 JHHSA SPRING 2013
explains the importance of looking at a broad range of
literature when developing theory:
An essential feature of theory building is
comparison of the emergent concepts,
theory, or hypotheses with the extant
literature. This involves asking what this
similar to, what does it contradict, and why.
A key to this process is to consider a broad
range of literature (p. 544).
Furthermore, Eisenhardt (1989) argues: “While linking
results to the literature is important in most research, it is
particularly crucial in theory-building research because the
findings often rest on a very limited number of cases” (p.
545). It is important to look at two types of literature—
those that conflict with the findings and those that agree
with the findings. The former allows one to be more
creative and groundbreaking, and “the result can be deeper
insight into both the emergent theory and the conflicting
literature, as well as sharpening the limits of
generalizability of the focal research” (Eisenhardt, 1989, p.
544). I therefore looked at the existing leadership and
network management literatures to assist me with the initial
conceptualization of “network leadership” and the possible
tasks a leader engages in to create a network organization.
Comparing the findings to extant literature in a
different area with similar findings allows a researcher to
tie “together underlying similarities in phenomena normally
not associated with each other. The result is often a theory
with stronger internal validity, wider generalizability, and
higher conceptual level” (Eisenhardt, 1989, p. 544). I
started looking at the leadership literature in order to
determine which area of the literature fit with my project.
Since the interviewees discussed extensively the tasks that
Kizer engaged in to get the NQF up-and-running, I decided
JHHSA SPRING 2013 489
to focus on and pull concepts from studies that outline the
tasks, activities, and roles of leaders; that is, what it is that
leaders actually do and the skills that are needed to
accomplish their goals. For example, Selznick (1984) in his
classic work, Leadership and Administration, delineates
some of the critical tasks a bureaucratic leader might
undertake in order to build an organization and its
institutional character and culture, and Doig and Hargrove
(1987) examine public sector leadership and discuss the
leadership tasks undertaken by leaders during the formative
stages of organizational development.
Phase four: Refinement of the interview guide and the
development of subcategories through axial coding. During
Phase Four, I conducted and analyzed additional interviews
and attended an annual meeting. After I conducted the
initial interviews and started to extrapolate themes, I turned
to the literature to help me with the development of a more
focused interview guide. The guide I developed covered the
following topics: the role of the member organizations in
the NQF, the Never Events project, key organizational
actors in the NQF’s environment, the NQF’s Board of
Directors, the Member Councils, the NQF’s staff, the role
of professional expertise in the NQF, Kizer’s role in the
NQF, and the NQF’s challenges and accomplishments. I
used the in-depth interview instrument of open-ended
questions as a guide when interviewing participants.
During this phase, I engaged in axial coding, which
is the “process of relating categories to their subcategories,
termed ‘axial’ because coding occurs around the axis of a
category, linking categories at the level of properties and
dimensions” (Strauss & Corbin, 1998, p. 123). The purpose
of axial coding is “to begin the process of reassembling
data that were fractured during open coding” (Strauss &
Corbin, 1998, p. 124). Strauss and Corbin (1998) identify
several tasks associated with axial coding:
490 JHHSA SPRING 2013
1. Laying out the properties of a category
and their dimensions, a task that begins
during open coding
2. Identifying the variety of conditions,
actions/interactions, and consequences
associated with a phenomenon
3. Relating a category to its subcategories
through statements denoting how they are
related to each other, and
4. Looking for cues in the data that denote
how major categories might relate to each
other (p. 126).
I began to ask questions about the larger categories (i.e., the
three critical tasks a network leader engages in to build a
network organization) that were emerging from the data:
defining the mission, building a social base, and managing
diverse interests through the consensus development
process. These questions allowed me to develop
subcategories that explain each category in greater detail.
According to Strauss and Corbin (1998), “subcategories
answer questions about the phenomenon such as when,
where, why, who, how, and with what consequences, thus
giving the concept greater explanatory power” (p. 125).
Phase five: Refinement of the theory through selective
coding. During Phase Five, I attended another annual
meeting and engaged in selective coding. Selective coding
is the “process of integrating and refining the theory”
(Strauss & Corbin, 1998, p. 143). Integration involves
organizing categories “around a central explanatory
concept” (Strauss & Corbin, 1998, p. 161). Strauss and
Corbin (1998) outline several tools that can be used to
assist with integration: telling or writing the storyline, using
diagrams, sorting and reviewing memos, and using
computer programs. After integration, the researcher begins
JHHSA SPRING 2013 491
to refine the theory. “Refining the theory consists of
reviewing the scheme for internal consistency and for gaps
in logic, filling in poorly developed categories and
trimming excess ones, and validating the scheme” (Strauss
& Corbin, 1998, p. 156). In this case, I wrote about the
leadership tasks interviewees maintained that Kizer
engaged in, using the memos I had written to assist me with
developing the narrative about the leadership tasks
involved in creating an NAO. As part of the integration
phase, I compiled my findings into a conference paper. The
conference presentation enabled me to obtain reactions to
my findings and refine my data further.
Phase six: Closure. Strauss and Corbin (1998) encourage
the researcher to consider three things when deciding to
conclude data collection and analysis: time, money and,
most importantly, theoretical saturation. Although the first
two issues are self-explanatory, the third deserves an
explanation. In order to reach closure, Eisenhardt (1989)
maintains that researchers should constantly ask themselves
two important questions. “When should I stop adding
cases?” and “When should I stop moving between data
collection and analysis?” The answer to both is theoretical
saturation, which Strauss and Corbin (1998, p. 143) define
as “The point in category development at which no new
properties, dimensions, or relationships emerge during
analysis.” There is nothing new that can be added through
further sampling; that is, collecting further information will
not enhance the categories and their properties any further.
Glaser and Strauss (1967, p. 224) maintain that closure
should occur “When the researcher is convinced that his
[sic] conceptual framework forms a systematic theory, that
it is a reasonably accurate statement of the matters studied,
that it is couched in a form possible for others to use in
studying a similar area, and that he can publish is results
with confidence, then he is near the end of his research.” I
492 JHHSA SPRING 2013
stopped collecting data when I started to hear the same
stories and examples from interviewees. I also had a well-
developed theoretical framework and found it difficult to
collect information that would shed additional light on it.
LIMITATIONS
One concern associated with grounded theory and
this study is whether the findings are transferable. While
Glaser and Strauss (1967) do not discuss this issue directly,
they discuss credibility and state:
“The reader’s judgment of credibility will
also rest upon his assessments of how the
researcher came to his conclusions. He will
note, for instance, what range of events the
researcher saw, whom he interviewed, who
talked to him, what diverse groups he
compared, what kinds of experiences he had,
and how he might have appeared to various
people whom he studied” (p. 231).
Locke (2001), however, notes that by gathering diverse
data observations, the general applicability or analytic
generalizability of the theory can be extended.
Another concern is the subjectivity of the
researcher. That is, the researcher becomes the primary
measurement instrument in the investigative process, in
contrast to that of quantitative research where the
researcher tries to stay removed from the process (Caudle,
1994). In grounded theory, one must let the theory emerge
from the data. This is not an easy task, especially
considering that researchers bring their own sets of biases
and expectations to research, but an astute grounded
theorist recognizes and is sensitive to bias. In order to
counteract researcher bias, a researcher needs to present
JHHSA SPRING 2013 493
evidence that corroborates the data (Caudle, 1994). One
way to do this is to gather multiple perspectives and
documents about the same incident (Eisenhardt, 1989). By
doing so, validity is enhanced because one is relying on
more than one person (and more than one document) to
provide an understanding of the events that occurred.
Lincoln and Guba (1985) also recommend that the
researcher find someone to examine the research findings
and play “devil’s advocate.” In order to address these
issues, I asked several individuals to serve as my devil’s
advocates.
A third concern relates to the interview process and
document analysis. Once interviews are granted, there is a
concern with being able to move beyond “scripted”
responses in order to get the “real” story. Potential
problems related to document analysis include identifying
the relevant documents and, once identified, gaining access
to those documents. Another concern is whether or not the
documents reflect reality. That is, do they accurately reflect
decision processes and decisions or were they written to
protect individuals? For example, one concern might be
that the minutes might not have been written in a way that
reflects the actual discussions and debates that occurred.
Another concern is whether minutes and memos contain
more than cursory information. In order to address these
concerns, I collected as many documents as possible and
spoke to a wide variety of individuals to verify that the
stories I had heard were indeed accurate.
A final concern is with the reliability or
dependability of the research (Neuman, 2003). The concern
with a study’s reliability can be remedied with replication.
In qualitative research, however, nothing remains static;
that is, reality is constantly changing, making replication
difficult. Furthermore, it is impossible to replicate such
things as semi-structured interviews. Qualitative
researchers argue that because processes are not stable over
494 JHHSA SPRING 2013
time and the research process itself is supposed to be
dynamic the preoccupation of “positivist” researchers with
regard to replication is unfounded (Neuman, 2003; Chenitz
& Swanson, 1986; Denzin, 1970). Indeed, Chenitz and
Swanson (1986) point out that replication is not important
to grounded theory. They maintain it is more important that
researchers be able to use the grounded theory to explain,
understand and predict phenomena in similar situations.
CONCLUSION AND LESSONS LEARNED
Janesick (1998) uses the metaphor of dance to
describe qualitative research. Grounded theory also
exemplifies the metaphor of dance in that it is an iterative,
creative process, which lends itself to experimentation and
exploration of concepts and ideas. During this process, I
learned five lessons about using grounded theory to
investigate the “black box” of network leadership.
First, grounded theory is not easy to master. There
are few prescriptions for how to conduct grounded theory
research. In my experience, Suddaby (2006) is correct in
observing: “The seamless craft of a well-executed
grounded theory study…is the product of considerable
experience, hard work, creative and, occasionally, a healthy
dose of good luck” (p. 639). Furthermore, many researchers
have found that competence in using grounded theory
techniques improves over time and with experience
(Suddaby, 2006). Learning to use grounded theory
techniques requires patience, flexibility, the ability to
tolerate ambiguity and time. The constant movement
between data analysis and data collection requires patience.
Developing grounded theory also demands that the
researcher be able to remain flexible and responsive to
emerging themes. It requires flexibility in the sense that one
must be willing to follow the data’s recommendations and
pursue an unintended line of inquiry. A researcher therefore
JHHSA SPRING 2013 495
also must be comfortable with ambiguity in the research
process. Since the data drive the direction of the research
and the lines of inquiry, grounded theory cannot be
“mapped” in advance. Researchers who must “map” the
research path ahead of time may have some difficulty
conducting research using a grounded theory approach.
These characteristics also mean that grounded theory
research is time-consuming.
Secondly, grounded theory research requires a
process. One of the benefits of conducting grounded theory
research is that it leads to fresh insights about the social
phenomenon under investigation. Achieving this requires
researchers to be intuitive, flexible, and open-minded. This
does not mean, however, that when conducting grounded
theory research that “anything goes” (Suddaby, 2006; Jones
& Noble, 2007). Although I certainly found that there is
tension between creativity and the rigorous application of
formal rules in conducting grounded theory, the perception
that grounded theory is an excuse to throw methodological
rigor out the window is wrong. Suddaby (2006) notes that
in evaluating grounded theory research, he checks that a
researcher has followed the core analytic tenets of
grounded theory, including theoretical sampling, constant
comparison, theoretical sensitivity, and the technical
language a researcher uses to describe the research process
is accurate, because he believes “there is a clear connection
between rigor in language and rigor in action” (p. 640).
Through this research I learned that being transparent about
how I collected, coded and analyzed my data is as
important in qualitative research as it is in quantitative
research.
Thirdly, qualitative software programs are helpful
in conducting grounded theory research. A grounded theory
approach can leave one feeling inundated by tons of data
that can be characterized as thematically diverse. I found
that using a software program, in particular QSR N5 and
496 JHHSA SPRING 2013
later N6, helped to counteract the feeling that I was
“drowning in data” by providing me with the tools to
organize and analyze the data efficiently. Although I
ultimately decided how to interpret the data and which
categories to focus on, QSR N5 and N6 allowed the
categories and themes to emerge from the data. The
programs, however, had too many “bells and whistles” that
I did not use and was a bit complex for my research needs.
Fourthly, transcribing my own interviews was
essential to understanding the data. The more exposure one
has to the data, the more familiar it becomes and the more
likely the researcher will be able to “listen to” and “hear”
what the data are trying to tell her. When one is conducting
an interview, one is more focused on asking the questions
and guiding the interview than on analyzing what is
actually occurring during an interview (tone of voice, body
language, etc.). Similarly, if one does not transcribe their
own interviews but reads a transcription, one misses
“hearing” the interview and the subtle cues and insights
that might be conveyed by listening to the interview.
Finally, and perhaps most importantly, grounded
theory has contributed substantially to my personal growth
as a scholar and researcher. Strauss and Corbin (1998)
outline the characteristics of a grounded theorist and
emphasize that these skills do not need to be developed
prior to engaging in grounded theory research:
• The ability to step back and critically
analyze situations.
• The ability to recognize tendency toward
bias.
• The ability to think abstractly.
• The ability to flexible and open to helpful
criticism.
• Sensitivity to the words and actions of
respondents.
JHHSA SPRING 2013 497
• A sense of absorption and devotion to the
work process (p. 7).
To this list, I would add intuition. I have always been very
intuitive and able to identify themes, and grounded theory
enabled me to draw on these strengths. As a new
researcher, conducting grounded theory research refined
and sharpened my ability to identify and ask broader
research questions and connect these questions to the
broader scholarly literature in the areas of network
management and leadership.
Strauss and Corbin (1998), however, neglect to
mention one important aspect of the research process that
the grounded theory approach, and qualitative methods
more generally, help new researchers develop: developing
and designing interview questions and guides and
conducting interviews. As a new researcher, this process,
with its emphasis on constant comparison between data
collection and analysis, helped me to develop and fine-tune
relevant questions. Furthermore, when I began this
research, I found it difficult and stressful to conduct
interviews. With more experience, I became more
comfortable with the interview process.
498 JHHSA SPRING 2013
REFERENCES
Agranoff, R. (2004, March). Inside the Network Operation.
Paper presented at the annual conference of the
American Society for Public Administration.
Portland, OR.
Agranoff, R., & McGuire, M. (2001). After the network is
formed: Process, power, and performance.” In M.
P. Mandell (Ed.), Getting results through
collaboration: Networks and network structures for
public policy and management (pp. 11-29).
Westport, CT: Quorum Books.
Blumer, H. (1969). Symbolic interactionism. Englewood
Cliffs, NJ: Prentice Hall.
Bogner, M. S. (Ed.). (1994). Human error in medicine.
Hillsdale, NJ: Lawrence Erlbaum Associates.
Brennan, T. A., & Berwick, D. M. (1996). New rules:
Regulation, markets, and the quality of American
health care. San Francisco: Jossey-Bass Publishers.
Bryman, A., Stephens, M., & a Campo, C. (1996). The
importance of context: Qualitative research and the
study of leadership. The Leadership Quarterly, 7,
353-370.
Castells, M. (2000). The rise of the network society (2nd
ed.). Malden, MA: Blackwell Publishers.
Caudle, S. L. (1994). Using qualitative approaches. In J. S.
Wholey, H. P. Hatry, & K. E. Newcomer (Eds.),
Handbook of practical program evaluation (pp. 69-
95). San Francisco: Jossey-Bass Publishers.
JHHSA SPRING 2013 499
Chenitz, W. C., & Swanson, J. M. (Eds.). (1986). From
practice to grounded theory: Qualitative research
in nursing. Menlo Park, CA: Addison Wesley
Publishing Company.
Creswell, J. W. (2003). Research design: Qualitative,
quantitative, and mixed methods approaches.
Thousand Oaks, CA: Sage Publications.
Daft, R. L., & Lewin, A. Y. (1993). Where are the theories
for “new” organizational forms? An editorial essay.
Organization Science, 4, i-vi.
Denzin, N. K. (1970). The research act: A theoretical
introduction to sociological methods. New York:
McGraw-Hill.
Denzin, N. K. (1994). The art and politics of interpretation.
In N. K. Denzin & Y. S. Lincoln (Eds.), Handbook
of Qualitative Research (pp. 500-515). Thousand
Oaks, CA: Sage Publications.
Doig, J. W., & Hargrove, E. C. (Eds.). (1987). Leadership
and innovation: A biographical perspective on
entrepreneurs in government. Baltimore, MD: The
Johns Hopkins University Press.
Eisenhardt, K. (1989). Building theories from case study
research. The Academy of Management Review, 14,
532-550.
Fielding, N. (1994). Varieties of research interviews. Nurse
Researcher, 1, 4-13.
500 JHHSA SPRING 2013
Glaser, B. G. (1992). Basics of grounded theory analysis:
Emergence versus forcing. Mill Valley, CA:
Sociology Press.
Glaser B. G., & Strauss, A. L. (1967). The discovery of
grounded theory: Strategies for qualitative
research. New York: Aldine Publishing Company.
Goldsmith, S., & Eggers, W. D. (2004). Governing by
network: The new shape of the public sector.
Washington, DC: Brookings Institution Press.
Gunningham, N. & Rees, J. V. (1997). Industry self-
regulation: An institutional perspective. Law &
Policy, 19, 363-414.
Hoflund, A. B. (2012a, forthcoming). Designing a
Decision-Making Process for a Network
Administrative Organization: A Case Study of the
National Quality Forum's Consensus Development
Process. Public Organization Review.
Hoflund, A. B. (2012b). Building a Network
Administrative Organization’s Social Base: Lessons
From the National Quality Forum, Administration
& Society, first published on February 16, 2012 as
doi:10.1177/0095399711433695.
Hoflund, A. B., & Farquhar, M. B. (2008). Challenges of
Democratic Experimentalism: A Case Study of the
National Quality Forum in Health Care. Regulation
and Governance, 2, 121-135.
Hunt, J. G. (1991). Leadership: A new synthesis. Newbury
Park, CA: Sage.
JHHSA SPRING 2013 501
Hunt, J. G., & Ropo, A. (1995). Multi-level leadership:
Grounded theory and mainstream theory applied to
the case of general motors. Leadership Quarterly, 6,
379-412.
Institute of Medicine. (1999). To err is human: Building a
safer health system. Washington, DC: National
Academy Press.
Institute of Medicine. (2001). Crossing the quality chasm:
A new health system for the 21st century.
Washington, DC: National Academy Press.
Janesick, V. J. (1998). The dance of qualitative research
design: Metaphor, methodolatry, and meaning. In
N. K. Denzin & Y. S. Lincoln (Eds.), Strategies of
qualitative inquiry (pp. 35-55). Thousand Oaks,
CA: Sage Publications.
Jones, R., & Noble, G. (2007). Grounded theory and
management research: a lack of integrity?
Qualitative Research in Organizations and
Management: An International Journal, 2, 84-103.
Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry.
Newbury Park, CA: Sage Publications.
Locke, K. (2001). Grounded theory in management
research. Thousand Oaks, CA: Sage Publications.
Marshall, C., & Rossman, G. B. (1999). Designing
qualitative research. Thousand Oaks, CA: Sage
Publications.
502 JHHSA SPRING 2013
McGuire, M., & Agranoff, R. (2007, October). Answering
the big questions, asking the bigger questions:
Expanding the public network management
empirical research agenda. Paper presented at the
9th Public Management Research Conference.
Tucson, AZ.
Millenson, M. L. (1997). Demanding medical excellence.
Chicago: University of Chicago Press.
Neuman, W. L. (2003). Social research methods:
Qualitative and quantitative approaches. (5th ed.).
Boston: Allyn & Bacon.
Parry, K. W. (1998). Grounded theory and social process:
A new direction for leadership research. The
Leadership Quarterly, 9, 85-105.
Patton, M. Q. (1987). How to use qualitative methods in
evaluation. Newbury Park, CA: Sage Publications.
Perrow, C. (1999). Normal accidents: Living with high-risk
technologies. Princeton, NJ: Princeton University
Press.
Polit, D. F., & Beck, C. T. (2004). Nursing research:
Principles and methods. New York: Lippincott,
Williams, & Wilkins.
President’s Advisory Commission on Consumer Protection
and Quality in the Health Care Industry. (1998).
Quality first: Better health care for all Americans.
Retrieved October 30, 2011 from
http://www.hcqualitycommission.gov/final/
JHHSA SPRING 2013 503
Reason, James T. (1990). Human error. New York:
Cambridge University Press.
Rees, J. V. (1994). Hostages of each other: The
transformation of nuclear safety since Three Mile
Island. Chicago: University of Chicago Press.
Richards, T. J., & Richards, L. (1994). Using computers in
qualitative research. In N. K. Denzin & Y. S.
Lincoln, (Eds.), Handbook of qualitative research,
(pp. 445–462). Thousand Oaks, CA: Sage
Publications.
Rubin, E. L. (2005). Beyond Camelot: Rethinking politics
and law for the modern state. Princeton, NJ:
Princeton University Press.
Selznick, P. (1984). Leadership in administration: A
sociological interpretation (Rev. ed). Berkeley, CA:
University of California Press.
Starr, P. (1984). The social transformation of American
medicine. New York: Basic Books.
Strauss, A., & Corbin, J. (1998). Basics of qualitative
research: Techniques and procedures for
developing grounded theory. Thousand Oaks, CA:
Sage Publications.
Suddaby, R. (2006). From the Editors: What grounded
theory is not. Academy of Management Journal, 49,
633-642.
504 JHHSA SPRING 2013
Wimpenny, P., & Gass, J. (2000). Interviewing in
phenomenology and grounded theory: is there a
difference? Journal of Advanced Nursing, 31, 1485-
1492.
Copyright of Journal of Health & Human Services
Administration is the property of Southern
Public Administration Education Foundation and its content
may not be copied or emailed to
multiple sites or posted to a listserv without the copyright
holder's express written permission.
However, users may print, download, or email articles for
individual use.
12-1
Chapter 12 Enhancing Decision Making
“Companies have been able to use technology to do some very
cool stuff to reach
customers in new ways, to automate operations. But one thing
many businesses haven’t
been able to do easily is use the data they’ve collected to find
and stamp out waste across
operations. Sifting through corporate data was supposed to
make executives more
efficient. Much of the time, though, it’s just made them more
confused.” (Fortune, March
3, 2002)
Even though this quote is ten years old, it’s still pertinent in
many companies. We’re
getting better though about turning raw data into useful
information that helps improve
decision making.
12.1 What are the different types of decisions and how does the
decision-making process work? How do information systems
support the activities of managers and management decision
making?
Each of us makes hundreds of decisions every day. If just a
fraction of those
decisions could be improved through better and more
information and better
processes, we’d all be delighted. Businesses feel the same way.
Customers would
be happier, employees would be more motivated, and managers
would have an
easier job. Most of all, businesses could improve their
profitability to the benefit
of all.
Business Value of Improved Decision Making
Table 12.1 provides a few examples of the dollar value that
enhanced decision making
would give to firms.
12-2
Don’t be misled into thinking that the dollar value of improving
decision-making
processes is limited to managers. As more business flatten their
organizational structures
and push decision making to lower levels, better decisions at all
levels can lead to
increased business value.
Types of Decisions
There are generally three classifications of decisions:
nonroutine
situations. Usually made at senior levels of management.
th definite procedures for
making the decision.
Usually made at the lowest organizational levels.
middle managers.
Figure 12.1 couples these three types of decisions with the
appropriate management level.
12-3
Figure 12.1 Information Requirements of Key Decision-Making
Groups in a Firm
business information but
also external industry and society changes; decisions affect
long-term, strategic goals
and the firm’s objectives.
resource allocation, short-
range plans, and performance of specific departments, task
forces, teams, and special
project groups.
onal management and project teams: Decisions affect
subunits and
individual employees regarding the resources, schedules, and
personnel decisions for
specific projects.
other employees, and most
importantly, the customer.
The Decision-Making Process
Making decisions requires four steps:
problems.
ing among solution alternatives.
monitoring how well
the solution is working.
These four steps are not always consecutive and may well be
concurrent or repetitive.
12-4
Managers and Decision Making in the Real World
Although information systems have gone a long way toward
improving the decision-
making process, they are not the Holy Grail. They should be
viewed as a way to assist
managers in making decisions, but not as the final answer.
Managerial Roles
Let’s compare the classical model of management with the
behavioral model. The
former describes the five classical functions of managers as:
Behavioral models of managers dissect the many activities
involved in the five functions
of management. That is, managers:
ation.
documentation.
Now, let’s take all of these activities and categorize them into
three managerial roles:
leaders, and liaisons.
spokespersons.
allocate resources,
negotiate and mediate conflicts.
Table 12.2 shows that supporting information systems exist for
only some of the
managerial behaviors but not all of them.
12-5
Table 12.2 Managerial Roles and Supporting Information
Systems
Real World Decision Making
Because you have no doubt had to make decisions in the real
world, you know for a fact
that the process is not as cut-and-dried as what we’ve reviewed
so far. Three reasons why
the whole process can blow up without a moment’s notice:
decision accurate,
consistent, complete, valid, timely, accessible, and of high
integrity? What if you
were making a decision about purchasing a house and found out
that there were errors
in your credit record that prevented you from obtaining the
necessary financing?
Perhaps the data was out of date or contained mistakes.
personal filters and
biases. Managers are no different. For instance, you may
suggest to your manager that
the department purchase a piece of equipment from a certain
manufacturer. Your
manager disapproves the suggestion because he had a bad
experience with that
company ten years ago. The manager’s bias negates the fact that
the company has
since improved and is the best and cheapest choice.
will sometimes do
whatever they can to keep the status quo. Decision makers are
no different especially
if they stand to lose. What if your department will benefit from
improving its business
processes to the benefit of all concerned except that the
manager will lose her job? It’s
likely the manager will not make decisions that will cause her to
lose her job.
Therefore, nothing gets done regarding improving processes.
12-6
High-Velocity Automated Decision Making
What if your friend asked you to find a copy of the lyrics to the
Beatles hit song “Hey
Jude?” How long do you think it would take you if Internet-
based search processes were
not available? Days? Weeks? A Google search for the
information takes less than five
seconds. That’s the power of high-velocity automated decision
making in today’s world.
Humans simply can’t match a computer’s speed and accuracy
for making some decisions.
Computer programmers use the same four step decision-making
process we’ve discussed
before when they create algorithms that help make these kinds
of lightning-fast decisions:
identify the problem, design a method for finding a solution,
define a range of acceptable
solutions, and implement the solution. They just have to be
careful that the algorithms are
written correctly to ensure proper decisions are made by
computers or you may end up
getting a profile of Jude Law, the actor.
Earlier we mentioned a class of decisions that are routine, very
structured, and have
definite procedures for determining the solution. In these
situations, why not automate the
process and have a computer make the decision much faster than
a human can?
Computers have these positive characteristics that make them
ideal for high-velocity
automated decision making:
followed
-speed processors
e task
The algorithms are structured to follow the intelligence, design,
choice, and
implementation steps we discussed as part of the decision-
making process. But, just in
case, the information systems used to process these kinds of
decisions should be
monitored and regulated by humans.
Bottom Line: Everyone makes decisions at all levels of an
organization. The goal is
to match the four decision-making organizational levels along
with the three types of
decisions to the appropriate kind of decision support system.
It’s important to
understand the roles and activities associated with management
decision making
and that information systems can only assist in the process.
12.2 How do business intelligence and business analytics
support decision making?
Business intelligence and business analytics provide managers
with a systematic way of
making sense of the vast amounts of data collected on
customers, suppliers, employees,
business partners, and the external business environment.
12-7
What Is Business Intelligence?
All of us collect information from our surroundings, try to
understand it, and then act on
it in an intelligent way. Businesses are no different other than
the fact that they have much
more data to collect, process, store, and disseminate.
A whole new industry has sprung up that helps businesses create
an infrastructure to
warehouse, integrate, report, and analyze data. This is where the
databases, data
warehouses, data marts, analytic platforms, and Hadoop that we
discussed in previous
chapters come back into the picture. Business intelligence
describes how businesses
collect, store, clean, and disseminate useful information to
executives, managers, and
employees.
Business analytics, on the other hand, are the tools and
techniques businesses use to
analyze and understand the data in a meaningful way. It’s one
thing to read a report that
says sales are 10 percent ahead of last year. Business analytic
tools, such as data mining,
statistics, online analytical processing, and models help
managers understand that part of
the cause is an increased focus on marketing to middle-aged
women with two children.
Business Intelligence Vendors
The top five vendors of BI and BA hardware and software
include well-known
technology companies: Oracle, SAP, IBM, Microsoft, and SAS.
These vendors are
primarily the same ones that we’ve discussed before when we
reviewed enterprise
systems. Perhaps the most interesting aspect of BI and BA
hardware and software suites
is that it’s the fastest-growing and largest segments in the U.S.
software market. That
demonstrates just how hungry businesses are to make sense of
all the data they have
available to them.
The Business Intelligence Environment
Let’s review six hardware, software, and management
capabilities that are included in the
business intelligence environment:
organizing structured and
unstructured data from different sources that people can analyze
and use.
process relevant
data stored in transactional databases, data warehouses, or data
marts.
to analyze data,
produce reports, respond to questions, and track their progress
using key
performance indicators (KPI).
management and
balanced scorecard methods that help managers focus on key
performance
indicators and industry strategic analyses. Requires strong
executive oversight to
ensure managers are focusing on the right issues and not just
producing reports
and dashboard screens because they can.
12-8
—MIS, DSS, and ESS: All the information
from MIS, DSS,
and ESS are integrated and delivered to the appropriate level of
management.
display data, thereby
making it easy to quickly understand information on a variety of
computing
devices.
Figure 12.3 helps you understand how these six elements work
together in business
intelligence and business analytics systems.
Figure 12.3 Business Intelligence and Analytics for Decision
Support
Business Intelligence and Analytics Capabilities
The days of receiving static reports that are out of date—
meaning more than 30 days or
even 30 minutes old—containing data that are meaningless are
over. Business
intelligence systems help correct that situation in five different
ways:
specific requirements.
isolate impacts of
parameters chosen by users.
cards: Visual reports that present
performance data chosen by
users.
reports based on
data they choose.
-level data summaries
and then drill down
to more specific data.
forecasting, what-if
scenario analysis, and analyze data using standard statistical
tools.
12-9
Who Uses Business Intelligence and Business Analytics?
The audience for business intelligence and business analytic
tools and techniques has
unique characteristics depending on their management level and
how they use the
systems:
tor organization activities using
dashboards and
scorecards.
data along different
dimensions.
prepackaged reports.
Figure 12.4 tells you how each division of the business
intelligence audience uses the
capabilities of these systems.
Figure 12.4 Business Intelligence Users
Production Reports
Because 80 percent of the people who access business
intelligence systems are casual
users, most vendors create a mass of predefined production
reports based on industry
standards and best practices. Table 12.4 gives you an idea of the
types of reports produced
for each business functional area.
12-10
Table 12.4 Examples of Business Intelligence Predefined
Production Reports
Predictive Analytics
Most times, customer behavior is very predictable if you’re
looking at and understanding
the right data. Companies use business analytic software to
figure out ahead of time how
reliable certain customers are regarding credit extensions, how
customers will respond to
changes in prices or services, or how successful new sales
locations will be. Those are the
kinds of questions predictive analytics can answer more quickly
and more easily than
humans. Predictive analytics helps managers ask and answer the
right questions to make
their company more successful.
Over the last few years, many retailers have drastically reduced
the number of catalogs
they send in snail mail to potential customers. With rising
postal fees and many people
using the Internet to make purchases, fewer and fewer of them
are waiting for the catalog
in the mail. By using predictive analytics, companies can weed
out people who are
unlikely to make catalog purchases and concentrate on those
who will. That decreases
marketing costs while increasing the ratio of catalogs to
purchasing customers.
Big Data Analytics
You’re shopping on a major retailer’s Web site when, all of a
sudden, you see a sweater
that you simply can’t live without. Alongside the sweater’s
display are pictures of a pair
of pants or skirt that, combined, will make the perfect outfit.
The pants and skirt are
labeled, “You might also like…” or “What other customers
purchased when they
purchased this sweater….”
Those extra items weren’t put there by chance but more as a
result of big data analytics
that we discussed in earlier chapters. Rather than requiring you
to thumb through pages
and pages of skirts and pants, the retailer will do it for you and,
in the meantime, increase
the chances of making an extra sale. Those recommendations
likely are a result of what
12-11
other customers purchased. The retailer captures all of its sales
data, analyzes it, and
includes data from social media streams to create the
customized recommendations.
Interactive Session: Technology: Big Data Make Cities Smarter
(see page 480 of the
text) describes how two major cities are using vast amounts of
data to improve
services for citizens and make city agencies more efficient.
Operational Intelligence and Analytics
Businesses are collecting millions of pieces of data on a
constant basis from sensors,
gauges, monitoring devices, and other technologies. The trick is
to make good use of the
data and turn it into information that employees and managers
can use to make better
decisions at the operational level of an organization.
Operational intelligence and analytics software gives
organizations the ability to analyze
all of the big data as they are generated in real time. The data
can feed dashboards for
employees or managers and give them a heads-up about
ongoing, real time operations.
Interactive Session: Management: America’s Cup: The Tension
Between
Technology and Human Decision Makers (see page 483 of the
text) describes how
Team USA used big data in real-time operation intelligence
mode to win the 2013
America’s Cup sailboat race. Ultimately, it was a balancing act
between technology-
driven decisions and human decision makers.
Location Analytics and Geographic Information Systems (GIS)
Many executive decisions depend on the availability of
information, internal and external.
For instance, a company that ships most of its products on
trucks needs data about
interstate highway access and traffic patterns to help control
shipping costs and make it
easier for drivers to access its warehouses. Some company
policies limit business
locations to high-traffic areas such as malls and similar densely
populated areas. Other
executive decisions revolve around data about current and
potential customers and their
geographic location.
Location analytics enable companies to gain insight from the
location component of
data, including data from mobile phones, wireless sensors,
scanning devices, location-
based cameras, and maps. The data may help businesses solve
problems, attract more
customers, or improve services.
Geographic information systems (GIS) rely heavily on
demographic data from the U.S.
Census Bureau. This type of decision-support system helps
managers visualize
geographic information more easily and make better decisions
based on digitized maps.
12-12
GIS data can be coupled with an organization’s internal data to
better allocate resources,
money, people, time, and material.
Management Strategies for Developing BI and BA Capabilities
Is it better to select a one-stop integrated solution for your
organization’s business
intelligence and business analytics systems or should you adopt
a multiple best-of-breed
vendor solution? Be aware that your decision carries risks and
rewards either way.
Single vendor: The risk is that your company becomes
dependent on the vendor’s pricing
power. The reward is that a single vendor promises hardware
and software that will work
together “out of the box.”
Multiple vendors: The reward is that you’ll have greater
flexibility and independence in
selecting your hardware and software. The risk is that you’ll
suffer compatibility issues,
not just between the BI hardware and software but with your
other systems as well.
You are locked into your decision and the switching costs are
extremely high regardless
of which way you decide to go.
As a manager you must:
business
Bottom Line: Business intelligence and business analytics
hardware and software
systems help businesses warehouse, integrate, report, and
analyze data from the
firm’s internal and external environment. BI and BA systems
provide employees,
managers, and executives with a wide variety of tools and
techniques that help them
make sense of all the data and ultimately make better decisions.
Each business must
decide whether a single vendor or multiple vendors will provide
the better system.
12.3 How do difference decision-making constituencies in an
organization use business intelligence? What is the role of
information systems in helping people working in a group make
decisions more efficiently?
At the beginning of this chapter we outlined the types of
decisions made at each
managerial level—structured, semistructured, and unstructured.
We also mentioned that
each management level has different information needs that
match the type of decisions
12-13
made at that level. Let’s look at the types of information
systems that match the
information needs.
Decision Support for Operational and Middle Management
For the most part, operational managers get their information
from transaction processing
systems. But, more and more, they are accessing management
information systems (MIS)
for a broader look at their company’s performance. Middle
management also relies on
MIS systems for the bulk of their information.
Here are the characteristics of a typical MIS system:
e flows of data
Support for Semistructured Decisions
Decision support systems help executives make better decisions
by using historical and
current data from internal information systems and external
sources of data. By
combining massive amounts of data with sophisticated
analytical models and tools, and
by making the system easy-to-use, they provide a much better
source of information to
use in the decision-making process.
Because of the limitations of hardware and software, early DSS
systems provided
executives only limited help. With the increased power of
computer hardware, and the
sophisticated software available today, DSS can crunch lots
more data, in less time, in
greater detail, with easy-to-use interfaces. The more detailed
data and information
executives have to work with, the better their decisions can be.
The “what-if” decisions most commonly made by executives use
sensitivity analysis
models to help them predict what effect the decisions will have
on the organization.
Executives don’t make decisions based solely on intuition. The
more information they
have, the more they experiment with different outcomes in a
safe mode, the better their
decisions. That’s the benefit of the models used in the software
tools.
Common spreadsheet software such as Microsoft’s Excel helps
managers review data in
two dimensions rather than just one by using pivot tables. They
can decipher patterns in
information and help them allocate resources better. Managers
using pivot tables can
develop better strategies because they’ll gain a better sense of
correlating data points.
Figure 12.6 shows you a typical screen used in a Microsoft
Excel pivot table.
12-14
Figure 12.6 A Pivot Table That Examines Customer Regional
Distribution and
Advertising Source
Decision Support for Senior Management: Balanced Scorecard
and
Enterprise Performance Management Methods
Executive support systems (ESS) are used primarily by senior
management whose
decisions are usually never structured and could be described as
“educated guesses.”
Executives rely as much, if not more, on external data than they
do on data internal to
their organization. Decisions must be made in the context of the
world outside the
organization. The problems and situations senior executives
face are very fluid, so the
system must be flexible and easy to manipulate.
Executive support systems don’t provide executives with ready-
made decisions. They
provide the information that helps them make their decisions.
Executives use that
information, along with their experience, knowledge, education,
and understanding of the
corporation and the business environment as a whole, to make
their decisions.
Using a balanced scorecard method, executives combine their
company’s internal
financial information with additional perspectives such as
customers, internal business
processes, and learning and growth. By focusing on key
performance indicators (KPIs)
in each of these areas, executives gain a better understanding of
how the organization is
performing overall. After senior management establishes KPIs
for each area, then and
only then can the flow of information be established. Figure
12.7 depicts the framework
for a balanced scorecard.
12-15
Figure 12.7 The Balanced Scorecard Framework
Business performance management (BPM) is yet another tool
for executives to
systematically translate the strategy they’ve developed for their
company into operational
targets. BPM methods use KPIs to help users measure the
organization’s progress toward
the targets. BPM is similar to the balanced scorecard approach
but with a stronger
strategic viewpoint than an operational viewpoint.
Executives often face information overload and must be able to
separate the chaff from
the wheat in order to make the right decision. On the other
hand, if the information they
have is not detailed enough, they may not be able to make the
best decision. An ESS can
supply the summarized information executives need and yet
provide the opportunity to
drill down to more detail if necessary.
As technology advances, ESS are able to link data from various
sources, both internal and
external, to provide the amount and kind of information
executives find useful. As
common software programs include more options and executives
gain experience using
these programs, they’re turning to them as an easy way to
manipulate information.
Because of the trend toward flatter organizations with fewer
layers of management,
companies are employing ESS at lower levels of the
organization. Flatter organizations
also require managers to access more information about a wider
range of activities than in
the past. This requirement can be accomplished with the aid of a
good ESS. Executives
can also monitor the performance of their own areas and of the
company as a whole.
Group Decision-Support Systems (GDSS)
More and more, companies are turning to groups and teams to
get work done. Hours upon
hours are spent in meetings, in group collaboration, in
communicating with many people.
12-16
To help groups make decisions, a new category of systems was
developed: the group
decision-support system (GDSS).
You’ve been there—a meeting where nothing seems to get done,
where some people
dominate the agenda and others never say a word, and it
dragged on for hours. When it
was all over no one was sure what was accomplished, if
anything. But the doughnuts and
coffee were good! Organizations have been struggling with this
problem for years. They
are now using GDSS as a way to increase the efficiency and
effectiveness of meetings.
In GDSS, the hardware includes more than just computers and
peripheral equipment. It
also includes the conference facilities, audiovisual equipment,
and networking equipment
that connect everyone. More sophisticated GDSS require
meeting facilitators and other
staff that keep the hardware operating correctly. Many
companies are bypassing specially
equipped rooms in favor of having group participants “attend”
the meeting through their
individual desktop computers.
Now instead of wasting time in meetings, people will know
ahead of time what is on the
agenda. All of the information generated during the meeting is
maintained for future use
and reference. Because input is anonymous, ideas are evaluated
on their own merit. And
for geographically separated attendees, travel time and dollars
are saved.
GDSS are best used for tasks involving:
Bottom Line: Executive support systems meet the needs of
corporate executives by
providing them with vast amounts of information quickly and in
graphic form to
help them make effective decisions. ESS must be flexible, easy-
to-use, and contain
both internal and external sources of information. The balanced
scorecard method
expands the view of the organization to include four
dimensions: financial, business
process, customer, and learning and growth. Group decision-
support systems,
comprised of hardware, software, and people, help streamline
group meetings and
communications by removing obstacles and using technology to
increase the
effectiveness of decisions.
11-1
Chapter 11 Managing Knowledge
“When people leave organizations today, they are potentially
taking with them knowledge
that’s critical to the future of the business,” says David
DeLong, a business consultant and
author of Lost Knowledge: Confronting the Threat of an Aging
Workforce. Whether it’s a
key client relationship, mastery of an outdated computer
language, or simply knowledge
about where certain files are saved on a company server, every
business has stored up bits
of information and knowhow that isn’t written in a manual or
recorded in a training
video.” (BusinessWeek.com, “The Knowledge Handoff,”
Douglas McMillian, Aug 26,
2008)
As we’ve mentioned in other chapters, information, therefore
knowledge, is becoming an
important corporate resource that must be captured, protected,
preserved, and grown.
How you do that is the focus of this chapter.
11.1 What is the role of knowledge management and knowledge
management programs in business?
Creating and using knowledge is not limited to information-
based companies; it is
necessary for all organizations, regardless of industry sector.
It’s not enough to make
good products. Companies must make products that are better,
less expensive to produce,
and more desirable than those of competitors. Using corporate
and individual knowledge
assets wisely will help companies do that. They must harness as
much knowledge as they
can and make it easy to share with others.
Important Dimensions of Knowledge
We discussed the difference between data and information in
previous chapters. The next
step up from information literacy is knowledge. An organization
must transform the
information it gathers and put it into meaningful concepts that
give it insight into ways of
improving the environment for its employees, suppliers, and
customers. Wisdom then is
using information to solve problems and knowing when, where,
and how to apply
knowledge.
You may have associated with the long-time employee that
seems to know how to fix the
intricate piece of machinery in his sleep. He’s been doing it for
years, he would tell you.
All of the knowledge he retains in his mind is tacit knowledge.
On the other hand, you
may have dealt with an employee who seems to grab the
operating manual every time he
turns around. The manual is an example of explicit knowledge—
that which is
documented.
Table 11.1 below shows that every organization has four
dimensions of knowledge:
11-2
How it handles them is what can make the organization a
successful one that seems to
outrun the competition, or one that seems to muddle through the
best it can. Examine
your organization and determine how well it values its
knowledge.
Organizational Learning and Knowledge Management
In the last few years, companies have downsized and flattened
their organizations. Many
employees who were laid off had been with these companies for
years. When they walked
out the door, they took experience, education, contacts, and
information with them.
Companies are finding out how important human resources are
to their success and are
11-3
establishing organizational learning mechanisms to capture and
use this corporate
knowledge.
That is, organizations gain experience by:
es
Successful organizations then incorporate what they’ve learned
into new business
processes and new management decision-making skills.
The Knowledge Management Value Chain
To understand the concept of knowledge management, think of
knowledge as a
resource, just like buildings, production equipment, product
designs, and money. All
these resources need to be systematically and actively managed.
Figure 11.1: The Knowledge Management Value Chain
Figure 11.1 shows you the activities that go into successfully
managing knowledge from
acquiring it to applying it throughout the firm. It’s not just
technology related to the
activities that’s important to recognize. In fact, as the text
points out, technology
applications of managing knowledge account for only about 20
percent. The other 80
percent deals with organizing and managing the knowledge
assets.
Knowledge Acquisition
11-4
Figure 11.1a: Acquiring Knowledge
Knowledge comes from a variety of sources. Early attempts of
gathering knowledge were
a hodgepodge of documents, reports, and employee input. Now
companies are using more
sophisticated technologies to gather information and knowledge
from e-mails,
transaction-processing systems, and outside sources such as
news reports and government
statistical data. It’s important to remember that a great deal of
knowledge should come
from external sources because no organization exists in a
vacuum.
Knowledge Storage
Figure 11.1b: Storing Knowledge
Remember, knowledge management is a continual process, not
an event. As you gather
knowledge you must store it efficiently and effectively.
Document management systems
are an easy way to digitize, index, and tag documents so that
employees can retrieve them
without much difficulty. Probably the most important element
of any knowledge system
is the people that feed the machine. One of the biggest reasons
knowledge systems have
failed in the past is because the employees and management
either didn’t place enough
importance on the system or felt threatened by it. All the people
in the digital firm need to
realize how important a resource knowledge is and help take
care of the system.
11-5
Knowledge Dissemination
Figure 11.1c: Disseminating Knowledge
Once you’ve built the system, acquired and stored the
knowledge, you need to make it
easy and efficient for employees to access the knowledge.
Portals, wikis, social networks,
IM, and e-mail are just some of the tools you can use to
disseminate information easily
and cheaply. Everyone complains nowadays of having too much
information. The
organization needs to make knowledge dissemination
unobtrusive and easy to master or
the employees and managers will ignore it or underutilize it.
Knowledge Application
Figure 11.1d: Applying Knowledge
You can have all the information and knowledge you need to
master any task, but if you
don’t build knowledge application into every functional area
and every system used
throughout the organization you are doing a disservice to both
the knowledge and the
company. As old systems are revamped and revised or new ones
built, pay attention to
how you can draw knowledge into them. The digital firm also
needs to explore how it can
use the knowledge system to build new processes for its
employees and suppliers, or new
products for its customers. Once it masters that, it can outrun
the competition and build a
stronger organization.
Building Organizational and Management Capital:
Collaboration, Communities of
Practice, and Office Environments
As knowledge becomes a central productive and strategic asset,
the success of the
organization increasingly depends on its ability to gather,
produce, maintain, and
disseminate knowledge. One way companies are responding to
the challenge is by
appointing a chief knowledge officer. His/her responsibilities
involve designing new
programs, systems, and methods for capturing and managing
knowledge. In some cases,
the hardest part of the CKO’s job may be convincing the
organization that it needs to
capture, organize, and use its corporate knowledge to remain
competitive.
11-6
Basically, the CKO concept is rooted in the realization that
companies can
no longer expect that the products and services that made them
successful
in the past will keep them viable in the future. Instead,
companies will
differentiate themselves on the basis of what they know and
their ability to
know how to do new things well and quickly. (copied from
Business.com
Web site, Nov 2008)
No one person has all the knowledge a digital firm needs. For
that you must rely on many
different people from many different locations. Communities of
practice (COP) are
built on the idea of combining ideas and knowledge from
various sources and making it
available to people inside and outside the organization.
Professional conferences,
newsletters, journals, and online newsgroups are excellent
sources of information that
center on the communities of practice concept.
Four areas where COP can make a difference are:
t as a spawning ground for new knowledge
Types of Knowledge Management Systems
Let’s look at three major types of knowledge management
systems as shown in Figure
11.2.
Figure 11.2: Major Types of Knowledge Management Systems
Enterprise-wide knowledge management systems are spread
across the organization
and offer a way to systematically complete the information
system activities we just
reviewed: acquiring, storing, disseminating, and applying
knowledge.
11-7
Knowledge work systems use powerful workstations that can
process the huge graphics
files some professionals need or to perform the massive
calculations other types of
professionals require. We’re not talking clip art or simple
addition or subtraction. We’re
talking huge amounts of data that must be processed quickly and
the necessary storage
capacity for large files. The workstations must also have the
necessary equipment and
telecommunication connections that enable the knowledge
workers to connect to external
sources of information via extranets, intranets, or the Internet.
These systems must have
system and application software that is easy-to-use and
manipulate, and intuitive to learn
so the workers can “get right to it.”
Intelligent techniques, which we’ll look at more closely at the
end of this chapter,
include expert systems, neural networks, and genetic
algorithms, to name a few.
Bottom Line: Knowledge is an important asset that must be
managed throughout
the enterprise. Knowledge must be acquired, stored, distributed,
and applied
effectively and efficiently. The chief knowledge officer is
responsible for ensuring
that the digital firm uses its knowledge assets wisely.
Communities of practice help
people reuse knowledge easily and cheaply.
11.2 What types of systems are used for enterprise-wide
knowledge management and how do they provide value for
businesses?
There are three primary types of knowledge in every
organization:
or
presentations
-mails, videos, digital pictures, or
brochures
With so many sources of information and knowledge available,
how does an organization
go about collecting, storing, distributing, and applying all of it?
That’s what we’ll
investigate in this section.
Enterprise Content Management Systems
Traditionally, knowledge wasn’t considered a corporate
resource. Many systems were
built without the necessary infrastructure for gathering, storing,
and retrieving knowledge.
That began changing in the 1990s when companies started
realizing how much
knowledge was lying dormant in text documents and reports.
The structured knowledge
systems were the first attempts at capturing this type of
knowledge and making it easily
available to a wider range of people inside the organization.
11-8
As people started using newer forms of communications such as
e-mails, chat rooms,
voice mail, and digital-based reports, graphics, and
presentations, organizations had to
adapt their systems to accommodate the semistructured
knowledge. Enterprise content
management systems are designed to piggyback on the more
rigidly structured
knowledge systems to incorporate a wider range of information.
Centralized knowledge
repositories include information from the structured and
semistructured knowledge
systems. The knowledge repository is then easily accessed by
employees throughout the
organization and can also be properly managed by the CKO.
Before you get all the data, information, and knowledge into
your enterprise content
management system, you need to create a taxonomy that will
help organize the
information into meaningful categories. That makes it easy to
find things later on. For
example, you have lots of digital renderings of your company
logo. Set up a taxonomy
called “Logo.” Now, whenever you add another digital file of a
logo, you tag it with the
taxonomy.
For those firms whose knowledge is contained in objects other
than simple documents,
digital asset management systems help them collect, store, and
process knowledge
contained in photographs, graphic images, videos, and audio
files.
Locating and Sharing Expertise
Because it’s simply too expensive and too time-consuming to
continually reinvent the
wheel, corporations are turning to enterprise content
management systems and systems
for collaboration and social business in an attempt to link those
who hold the knowledge
with those that need the knowledge. Employees who have the
tacit knowledge about a
product or project in their head are easily connected with
employees who need to know
the information through these kinds of networks. Corporations
save time and money by
placing data pertaining to the subject matter experts in a
directory that all employees can
access. Users are easily connected to the experts through these
networks and can
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx
EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx

More Related Content

Similar to EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx

Research Design.ppt
Research Design.pptResearch Design.ppt
Research Design.ppt
NadeemBakhsh1
 
s11135-020-01072-9.pdf
s11135-020-01072-9.pdfs11135-020-01072-9.pdf
s11135-020-01072-9.pdf
WAQAS FAROOQ
 
Social Contagion Theory
Social Contagion TheorySocial Contagion Theory
Social Contagion Theory
augustodefranco .
 
Baxter(1)
Baxter(1)Baxter(1)
Baxter(1)
waninasri
 
The Case StudyMany disciplines use various forms of the ca.docx
The Case StudyMany disciplines use various forms of the ca.docxThe Case StudyMany disciplines use various forms of the ca.docx
The Case StudyMany disciplines use various forms of the ca.docx
mamanda2
 
The Case StudyMany disciplines use various forms of the ca.docx
The Case StudyMany disciplines use various forms of the ca.docxThe Case StudyMany disciplines use various forms of the ca.docx
The Case StudyMany disciplines use various forms of the ca.docx
arnoldmeredith47041
 
People In Organisations
People In OrganisationsPeople In Organisations
PSY-850 Lecture 5Objectives Appraise the suitability of groun.docx
PSY-850 Lecture 5Objectives Appraise the suitability of groun.docxPSY-850 Lecture 5Objectives Appraise the suitability of groun.docx
PSY-850 Lecture 5Objectives Appraise the suitability of groun.docx
amrit47
 
ilovepdf_merged.pdf- about Media and communication
ilovepdf_merged.pdf- about Media and communicationilovepdf_merged.pdf- about Media and communication
ilovepdf_merged.pdf- about Media and communication
KonulAzizli
 
10.1.1.10.1265
10.1.1.10.126510.1.1.10.1265
10.1.1.10.1265
Hamdi Momammed
 
Qualitative Research Appraisal
Qualitative Research AppraisalQualitative Research Appraisal
Qualitative Research Appraisal
Alexis Naranjo
 
Research Proposal Writing
Research Proposal Writing Research Proposal Writing
Research Proposal Writing
Mark Raygan Garcia
 
Grounded theory define, types, explanation
Grounded theory define, types, explanation Grounded theory define, types, explanation
Grounded theory define, types, explanation
DolehKhan
 
Advanced Research Methodology.docx
Advanced Research Methodology.docxAdvanced Research Methodology.docx
Advanced Research Methodology.docx
AyeshaAyyaz3
 
MIX methode- building better theory by bridging the quantitative-qualitative ...
MIX methode- building better theory by bridging the quantitative-qualitative ...MIX methode- building better theory by bridging the quantitative-qualitative ...
MIX methode- building better theory by bridging the quantitative-qualitative ...
politeknik NSC Surabaya
 
A Case in Case Study Methodology.pdf
A Case in Case Study Methodology.pdfA Case in Case Study Methodology.pdf
A Case in Case Study Methodology.pdf
Karla Long
 
10.11771534484305284318Human Resource Development Review Ma.docx
10.11771534484305284318Human Resource Development Review  Ma.docx10.11771534484305284318Human Resource Development Review  Ma.docx
10.11771534484305284318Human Resource Development Review Ma.docx
paynetawnya
 
Sujay Rao Mandavilli IJISRT23MAY2363.pdf
Sujay Rao Mandavilli IJISRT23MAY2363.pdfSujay Rao Mandavilli IJISRT23MAY2363.pdf
Sujay Rao Mandavilli IJISRT23MAY2363.pdf
Sujay Rao Mandavilli
 
Assignment Research Methods
Assignment Research MethodsAssignment Research Methods
Assignment Research Methods
Nat Rice
 

Similar to EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx (20)

Research Design.ppt
Research Design.pptResearch Design.ppt
Research Design.ppt
 
s11135-020-01072-9.pdf
s11135-020-01072-9.pdfs11135-020-01072-9.pdf
s11135-020-01072-9.pdf
 
Social Contagion Theory
Social Contagion TheorySocial Contagion Theory
Social Contagion Theory
 
Baxter(1)
Baxter(1)Baxter(1)
Baxter(1)
 
Baxter
BaxterBaxter
Baxter
 
The Case StudyMany disciplines use various forms of the ca.docx
The Case StudyMany disciplines use various forms of the ca.docxThe Case StudyMany disciplines use various forms of the ca.docx
The Case StudyMany disciplines use various forms of the ca.docx
 
The Case StudyMany disciplines use various forms of the ca.docx
The Case StudyMany disciplines use various forms of the ca.docxThe Case StudyMany disciplines use various forms of the ca.docx
The Case StudyMany disciplines use various forms of the ca.docx
 
People In Organisations
People In OrganisationsPeople In Organisations
People In Organisations
 
PSY-850 Lecture 5Objectives Appraise the suitability of groun.docx
PSY-850 Lecture 5Objectives Appraise the suitability of groun.docxPSY-850 Lecture 5Objectives Appraise the suitability of groun.docx
PSY-850 Lecture 5Objectives Appraise the suitability of groun.docx
 
ilovepdf_merged.pdf- about Media and communication
ilovepdf_merged.pdf- about Media and communicationilovepdf_merged.pdf- about Media and communication
ilovepdf_merged.pdf- about Media and communication
 
10.1.1.10.1265
10.1.1.10.126510.1.1.10.1265
10.1.1.10.1265
 
Qualitative Research Appraisal
Qualitative Research AppraisalQualitative Research Appraisal
Qualitative Research Appraisal
 
Research Proposal Writing
Research Proposal Writing Research Proposal Writing
Research Proposal Writing
 
Grounded theory define, types, explanation
Grounded theory define, types, explanation Grounded theory define, types, explanation
Grounded theory define, types, explanation
 
Advanced Research Methodology.docx
Advanced Research Methodology.docxAdvanced Research Methodology.docx
Advanced Research Methodology.docx
 
MIX methode- building better theory by bridging the quantitative-qualitative ...
MIX methode- building better theory by bridging the quantitative-qualitative ...MIX methode- building better theory by bridging the quantitative-qualitative ...
MIX methode- building better theory by bridging the quantitative-qualitative ...
 
A Case in Case Study Methodology.pdf
A Case in Case Study Methodology.pdfA Case in Case Study Methodology.pdf
A Case in Case Study Methodology.pdf
 
10.11771534484305284318Human Resource Development Review Ma.docx
10.11771534484305284318Human Resource Development Review  Ma.docx10.11771534484305284318Human Resource Development Review  Ma.docx
10.11771534484305284318Human Resource Development Review Ma.docx
 
Sujay Rao Mandavilli IJISRT23MAY2363.pdf
Sujay Rao Mandavilli IJISRT23MAY2363.pdfSujay Rao Mandavilli IJISRT23MAY2363.pdf
Sujay Rao Mandavilli IJISRT23MAY2363.pdf
 
Assignment Research Methods
Assignment Research MethodsAssignment Research Methods
Assignment Research Methods
 

More from ssuser454af01

The following pairs of co-morbid disorders and  a write 700 words .docx
The following pairs of co-morbid disorders and  a write 700 words .docxThe following pairs of co-morbid disorders and  a write 700 words .docx
The following pairs of co-morbid disorders and  a write 700 words .docx
ssuser454af01
 
The following is an access verification technique, listing several f.docx
The following is an access verification technique, listing several f.docxThe following is an access verification technique, listing several f.docx
The following is an access verification technique, listing several f.docx
ssuser454af01
 
The following discussion board post has to have a response. Please r.docx
The following discussion board post has to have a response. Please r.docxThe following discussion board post has to have a response. Please r.docx
The following discussion board post has to have a response. Please r.docx
ssuser454af01
 
The following information has been taken from the ledger accounts of.docx
The following information has been taken from the ledger accounts of.docxThe following information has been taken from the ledger accounts of.docx
The following information has been taken from the ledger accounts of.docx
ssuser454af01
 
The following attach files are my History Homewrok and Lecture Power.docx
The following attach files are my History Homewrok and Lecture Power.docxThe following attach files are my History Homewrok and Lecture Power.docx
The following attach files are my History Homewrok and Lecture Power.docx
ssuser454af01
 
The following is adapted from the work of Paul Martin Lester.In .docx
The following is adapted from the work of Paul Martin Lester.In .docxThe following is adapted from the work of Paul Martin Lester.In .docx
The following is adapted from the work of Paul Martin Lester.In .docx
ssuser454af01
 
The following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxThe following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docx
ssuser454af01
 
The Five stages of ChangeBy Thursday, June 25, 2015, respond to .docx
The Five stages of ChangeBy Thursday, June 25, 2015, respond to .docxThe Five stages of ChangeBy Thursday, June 25, 2015, respond to .docx
The Five stages of ChangeBy Thursday, June 25, 2015, respond to .docx
ssuser454af01
 
The first step in understanding the behaviors that are associated wi.docx
The first step in understanding the behaviors that are associated wi.docxThe first step in understanding the behaviors that are associated wi.docx
The first step in understanding the behaviors that are associated wi.docx
ssuser454af01
 
The first one is due Sep 24 at 1100AMthe French-born Mexican jo.docx
The first one is due Sep 24 at 1100AMthe French-born Mexican jo.docxThe first one is due Sep 24 at 1100AMthe French-born Mexican jo.docx
The first one is due Sep 24 at 1100AMthe French-born Mexican jo.docx
ssuser454af01
 
The first part is a direct quote, copied word for word. Includ.docx
The first part is a direct quote, copied word for word. Includ.docxThe first part is a direct quote, copied word for word. Includ.docx
The first part is a direct quote, copied word for word. Includ.docx
ssuser454af01
 
The final research paper should be no less than 15 pages and in APA .docx
The final research paper should be no less than 15 pages and in APA .docxThe final research paper should be no less than 15 pages and in APA .docx
The final research paper should be no less than 15 pages and in APA .docx
ssuser454af01
 
The first one Description Pick a physical activity. Somethi.docx
The first one Description Pick a physical activity. Somethi.docxThe first one Description Pick a physical activity. Somethi.docx
The first one Description Pick a physical activity. Somethi.docx
ssuser454af01
 
The first column suggests traditional familyschool relationships an.docx
The first column suggests traditional familyschool relationships an.docxThe first column suggests traditional familyschool relationships an.docx
The first column suggests traditional familyschool relationships an.docx
ssuser454af01
 
The first president that I actually remembered was Jimmy Carter.  .docx
The first president that I actually remembered was Jimmy Carter.  .docxThe first president that I actually remembered was Jimmy Carter.  .docx
The first president that I actually remembered was Jimmy Carter.  .docx
ssuser454af01
 
The final project for this course is the creation of a conceptual mo.docx
The final project for this course is the creation of a conceptual mo.docxThe final project for this course is the creation of a conceptual mo.docx
The final project for this course is the creation of a conceptual mo.docx
ssuser454af01
 
The finance department of a large corporation has evaluated a possib.docx
The finance department of a large corporation has evaluated a possib.docxThe finance department of a large corporation has evaluated a possib.docx
The finance department of a large corporation has evaluated a possib.docx
ssuser454af01
 
The Final Paper must have depth of scholarship, originality, theoret.docx
The Final Paper must have depth of scholarship, originality, theoret.docxThe Final Paper must have depth of scholarship, originality, theoret.docx
The Final Paper must have depth of scholarship, originality, theoret.docx
ssuser454af01
 
The Final exam primarily covers the areas of the hydrosphere, the bi.docx
The Final exam primarily covers the areas of the hydrosphere, the bi.docxThe Final exam primarily covers the areas of the hydrosphere, the bi.docx
The Final exam primarily covers the areas of the hydrosphere, the bi.docx
ssuser454af01
 
The Final Paper must be 8 pages (not including title and reference p.docx
The Final Paper must be 8 pages (not including title and reference p.docxThe Final Paper must be 8 pages (not including title and reference p.docx
The Final Paper must be 8 pages (not including title and reference p.docx
ssuser454af01
 

More from ssuser454af01 (20)

The following pairs of co-morbid disorders and  a write 700 words .docx
The following pairs of co-morbid disorders and  a write 700 words .docxThe following pairs of co-morbid disorders and  a write 700 words .docx
The following pairs of co-morbid disorders and  a write 700 words .docx
 
The following is an access verification technique, listing several f.docx
The following is an access verification technique, listing several f.docxThe following is an access verification technique, listing several f.docx
The following is an access verification technique, listing several f.docx
 
The following discussion board post has to have a response. Please r.docx
The following discussion board post has to have a response. Please r.docxThe following discussion board post has to have a response. Please r.docx
The following discussion board post has to have a response. Please r.docx
 
The following information has been taken from the ledger accounts of.docx
The following information has been taken from the ledger accounts of.docxThe following information has been taken from the ledger accounts of.docx
The following information has been taken from the ledger accounts of.docx
 
The following attach files are my History Homewrok and Lecture Power.docx
The following attach files are my History Homewrok and Lecture Power.docxThe following attach files are my History Homewrok and Lecture Power.docx
The following attach files are my History Homewrok and Lecture Power.docx
 
The following is adapted from the work of Paul Martin Lester.In .docx
The following is adapted from the work of Paul Martin Lester.In .docxThe following is adapted from the work of Paul Martin Lester.In .docx
The following is adapted from the work of Paul Martin Lester.In .docx
 
The following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxThe following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docx
 
The Five stages of ChangeBy Thursday, June 25, 2015, respond to .docx
The Five stages of ChangeBy Thursday, June 25, 2015, respond to .docxThe Five stages of ChangeBy Thursday, June 25, 2015, respond to .docx
The Five stages of ChangeBy Thursday, June 25, 2015, respond to .docx
 
The first step in understanding the behaviors that are associated wi.docx
The first step in understanding the behaviors that are associated wi.docxThe first step in understanding the behaviors that are associated wi.docx
The first step in understanding the behaviors that are associated wi.docx
 
The first one is due Sep 24 at 1100AMthe French-born Mexican jo.docx
The first one is due Sep 24 at 1100AMthe French-born Mexican jo.docxThe first one is due Sep 24 at 1100AMthe French-born Mexican jo.docx
The first one is due Sep 24 at 1100AMthe French-born Mexican jo.docx
 
The first part is a direct quote, copied word for word. Includ.docx
The first part is a direct quote, copied word for word. Includ.docxThe first part is a direct quote, copied word for word. Includ.docx
The first part is a direct quote, copied word for word. Includ.docx
 
The final research paper should be no less than 15 pages and in APA .docx
The final research paper should be no less than 15 pages and in APA .docxThe final research paper should be no less than 15 pages and in APA .docx
The final research paper should be no less than 15 pages and in APA .docx
 
The first one Description Pick a physical activity. Somethi.docx
The first one Description Pick a physical activity. Somethi.docxThe first one Description Pick a physical activity. Somethi.docx
The first one Description Pick a physical activity. Somethi.docx
 
The first column suggests traditional familyschool relationships an.docx
The first column suggests traditional familyschool relationships an.docxThe first column suggests traditional familyschool relationships an.docx
The first column suggests traditional familyschool relationships an.docx
 
The first president that I actually remembered was Jimmy Carter.  .docx
The first president that I actually remembered was Jimmy Carter.  .docxThe first president that I actually remembered was Jimmy Carter.  .docx
The first president that I actually remembered was Jimmy Carter.  .docx
 
The final project for this course is the creation of a conceptual mo.docx
The final project for this course is the creation of a conceptual mo.docxThe final project for this course is the creation of a conceptual mo.docx
The final project for this course is the creation of a conceptual mo.docx
 
The finance department of a large corporation has evaluated a possib.docx
The finance department of a large corporation has evaluated a possib.docxThe finance department of a large corporation has evaluated a possib.docx
The finance department of a large corporation has evaluated a possib.docx
 
The Final Paper must have depth of scholarship, originality, theoret.docx
The Final Paper must have depth of scholarship, originality, theoret.docxThe Final Paper must have depth of scholarship, originality, theoret.docx
The Final Paper must have depth of scholarship, originality, theoret.docx
 
The Final exam primarily covers the areas of the hydrosphere, the bi.docx
The Final exam primarily covers the areas of the hydrosphere, the bi.docxThe Final exam primarily covers the areas of the hydrosphere, the bi.docx
The Final exam primarily covers the areas of the hydrosphere, the bi.docx
 
The Final Paper must be 8 pages (not including title and reference p.docx
The Final Paper must be 8 pages (not including title and reference p.docxThe Final Paper must be 8 pages (not including title and reference p.docx
The Final Paper must be 8 pages (not including title and reference p.docx
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL.docx

  • 1. EXPLORING THE USE OF GROUNDED THEORY AS A METHODOLOGICAL APPROACH TO EXAMINE THE 'BLACK BOX' OF NETWORK LEADERSHIP IN THE NATIONAL QUALITY FORUM A. BRYCE HOFLUND University of Nebraska at Omaha ABSTRACT This paper describes how grounded theory was used to investigate the “black box” of network leadership in the creation of the National Quality Forum. Scholars are beginning to recognize the importance of network organizations and are in the embryonic stages of collecting and analyzing data about network leadership processes. Grounded theory, with its focus on deriving theory from empirical data, offers researchers a distinctive way of studying little-known phenomena and is therefore well suited to exploring network leadership processes. Specifically, this
  • 2. paper provides an overview of grounded theory, a discussion of the appropriateness of grounded theory to investigating network phenomena, a description of how the research was conducted, and a discussion of the limitations and lessons learned from using this approach. Keywords: grounded theory, network leadership, health care, network organization, collaboration 470 JHHSA SPRING 2013 It is a capital mistake to theorize before one has the data. - Sherlock Holmes The task of scientific study is to lift the veils that cover the area of life that one proposes to study. -- Blumer (1978) Generating a theory involves a process of research. --Glaser and Strauss (1967)
  • 3. In The Rise of the Network Society (2000), the first in a trilogy of books about the social, economic, and cultural impacts of the Information Age, sociologist Manual Castells documents the rise of the Information Age. A defining feature of this new age is interconnectedness, which is manifested through the complex networks that are a ubiquitous part of the Information Age. Networks are everywhere; there are, among other things, global business networks, cellular networks, television networks, social networks, the Internet, and computer networks. In the public sector we also are witnessing the movement away from bureaucratic, hierarchical organizations toward networks. Rubin (2005) argues that the three-branch metaphor for government is outmoded and that the network metaphor more accurately describes government and intergovernmental relations today. Goldsmith and Eggers (2004) note that this shift has occurred for a number of reasons, including an increase in cross-agency and cross-government initiatives, an increase in public-private collaboration, and the growth of the Digital Revolution, which allows for increased citizen demand for and input in service delivery options. JHHSA SPRING 2013 471 In 1999 the health care industry created the National Quality Forum (NQF), a network organization, whose founding mission was to improve American healthcare through endorsement of consensus-based national standards for measurement and public reporting of healthcare
  • 4. performance data that provide meaningful information about whether care is safe, timely, beneficial, patient- centered, equitable and efficient. The NQF was created because of all of the failed attempts in health care to make some headway in quality improvement. The NQF is representative of a network organization because it was created to address issues of health care quality in a new way by bringing together organizations from the public and private sectors and providing them with a forum to discuss and debate measures of quality, and ultimately, to effect change. The NQF thus represents a major administrative experiment in addressing health policy issues. Dr. Kenneth W. Kizer, as the NQF’s first leader, was tasked with building the network. This makes network leadership important. Since there were so few empirical studies into the phenomenon of network leadership, a grounded theory approach seemed to be the most appropriate way to study the “black box” of network leadership. The purpose of this paper is to provide some insight into how to conduct an empirical study of network leadership using a grounded theory approach and considers some of the strengths, limitations, and lessons learned from this application of grounded theory. I argue that grounded theory offers a powerful and promising approach way of studying such social phenomena as network leadership. It is important to note that this paper does not present the findings from this study of network leadership since they have been published elsewhere (see Hoflund & Farquhar, 2008; Hoflund, 2012a, Hoflund, 2012b). 472 JHHSA SPRING 2013
  • 5. This paper is organized into three sections. First, I discuss the research design and strategy for this study, including a brief overview of the history and nature of grounded theory and its usefulness as an approach for studying networks and leadership. Secondly, I discuss data collection and data analysis. In Part Three, I conclude by discussing some of the limitations and lessons I learned from conducting research using a grounded theory approach. RESEARCH DESIGN Since I was interested in exploring the phenomenon of network leadership, I used a qualitative research design and, more specifically, a grounded theory approach to conduct this study about network leadership during a network organization’s formative stages. A qualitative research design is most appropriate for this study because it provides the best means to explore complex processes and investigate “little-known phenomena or innovative systems” such as network leadership, and it is useful when “relevant variables have yet to be identified” as is the case with the critical tasks related to network leadership (Marshall & Rossman, 1999, p. 57). A qualitative approach also allows one to describe the “naturally unfolding program processes and impacts” and allows for a certain richness in the research—the participants’ thoughts, opinions, and experiences are captured in their own words—that one may not be able to get through the use of another approach (Patton, 1987, p.
  • 6. 14). That is, a qualitative approach allows one to “lift the veils” surrounding an area of study. But this does not mean that this type of research does not follow a process. In fact, it is quite the opposite. Grounded theory allows researchers to follow a process that allows for creativity in discovering and understanding JHHSA SPRING 2013 473 social processes and phenomena (Glaser & Strauss, 1967). I first discuss the origins and philosophical underpinnings of grounded theory and, in the following sub-section, the benefits of a grounded theory approach and justification for why I employed this approach to study network leadership. Grounded Theory’s Origins and Philosophical Underpinnings Glaser and Strauss (1967) state that grounded theory is the “discovery of data systematically obtained from social research” (p. 2). Creswell (2003) elaborates on their definition by noting that grounded theory is a strategy “in which the researcher attempts to derive a general, abstract theory of a process, action, or interaction grounded in the views of participants in a study” (p. 14). Glaser states that grounded theory is useful to “researchers and practitioners in fields that concern themselves with issues relating to human behavior in organizations, groups, and other social configurations” (Glaser, 1992, p. 13). The nature of grounded theory is to
  • 7. ensure that the theory being generated will “fit” the situation being studied and that it will “work” in terms of describing the behavior being observed (Glaser & Strauss, 1967, p. 3). It follows from this, then, that for theory to be useful for understanding social phenomena and behavior, the best way to develop theory is to “ground” it in data. In using the grounded theory method to develop theory, one begins with an area of study and allows what is relevant to that area to emerge from the data. Two key characteristics define grounded theory: a de-emphasis on the verification of theory and an emphasis on the generation of theory. Glaser and Strauss (1967) proposed grounded theory as a way to counteract the preoccupation with the verification of theory in both qualitative and quantitative research that had dominated social science since the 1940s, to address some of the weaknesses of 474 JHHSA SPRING 2013 qualitative theory, and to allow for the development of theory that would be meaningful to both practitioners and scholars. Glaser and Strauss (1967) argued that scholars were too concerned with verifying the “grand theories” bestowed on us by “great men” such as Marx, Weber, and Durkheim. After World War II, there was significant growth in the development and distribution of quantitative methods (e.g., survey research) that could be used to test and verify these theories. In The Discovery of Grounded Theory, Glaser and Strauss (1967) offer a polemic against Robert Merton and the positivist approach:
  • 8. His reasoning necessarily leads to the position that data should fit the theory, in contrast to our position that the theory should fit the data [emphasis in the original] (p. 261). While grounded theory acknowledges that verification of theory is important, it argues that this task should be subordinate to the generation of theory. Glaser and Strauss (1967) also proposed grounded theory as a way of strengthening qualitative research. They argued that qualitative approaches suffered from an overemphasis on verification, but more importantly were increasingly labeled as “impressionistic” and criticized for not being rigorous or systematic enough. On the other hand, quantitative methods were seen as rigorous and “more scientific.” As a direct result of this, over time, quantitative methods gradually usurped qualitative approaches to studying and gaining insight about social phenomena. With the publication of The Discovery of Grounded Theory, however, Glaser and Strauss tried to formalize and systematize “grounded” theory, and qualitative methods JHHSA SPRING 2013 475 more generally, as a legitimate form of inquiry into social phenomena. What was unique about their approach,
  • 9. however, was that they did not discount the importance and benefits of scientific rigor that had been so lauded in quantitative research: It is vital to note that the fundamentals of Grounded Theory, the underlying analytic methodology, are in very large measure drawn from the analytic methodology and procedures of inductive quantitative analysis laboriously discovered by researchers and students in the Department of Sociology and the Bureau of Applied Social Research at Columbia University in the 1950’s and 1960’s (Glaser, 1992, p. 7). Perhaps the most important difference to note between grounded theory and other approaches to qualitative research is grounded theory’s emphasis on theory development. Glaser and Strauss (1967) argue that the growth of positivism and the emphasis on verification of theory rather than generation of theory resulted in a significant gap between theory and empirical research. Theory that was “grounded” in data, they proposed, would contribute toward “closing the embarrassing gap between theory and empirical research” (Glaser & Strauss, 1967, p. vii). During the past thirty-five years, researchers from a variety of different disciplines, including psychology, information science, education and health care, have used grounded theory as a means of exploring social relationships and phenomena.
  • 10. 476 JHHSA SPRING 2013 Grounded Theory as a Means of Exploring Network Leadership Scholars argue that new methods are required to research and understand new organizational forms such as network organizations. Daft and Lewin (1993) note the trend away from bureaucratic, hierarchical structures toward more loosely coupled, flexible structures that emphasize learning. They contend that in order for managers to function in this new environment and for researchers to understand this new environment, these emergent forms of organization, which include network organizations, require new forms of empirical investigation (Daft & Lewin, 1993). This new form of investigation, according to Daft and Lewin (1993), “will be characterized by midrange theory and method, grounded research, and research that does not presume to test hypotheses” (p. ii). Daft and Lewin (1993) argue that the primary benefit of a grounded theory approach to emergent organizational structures is: A midrange, grounded study of some part of a new organizational form would enable a scholar to learn firsthand about it and provide new theory. We are proposing a role for organizational scholars that is primarily one of developing new variables and theories to describe new phenomena, not to test hypotheses. If done well, the emerging knowledge will advance both organization
  • 11. theory and the practice of management (p. iii). More recently, other scholars, including McGuire and Agranoff (2007) and Agranoff (2004), have explored the relevance of grounded theory as an approach to studying networks, noting that employing grounded theory will help JHHSA SPRING 2013 477 answer some of the “big questions” about network management by allowing researchers to delve more deeply into the “black box” of networks and examine them from the inside out. Scholars also contend that leadership theory would be enhanced by the generation of theories that are “grounded” in what leaders are actually doing (Parry, 1998). The applicability of grounded theory to leadership has been demonstrated in a number of studies (Hunt, 1991; Hunt & Ropo, 1995). Hunt and Ropo (1995) argue that grounded theory can be effective as a means of studying social processes, such as leadership because “grounded theory emphasizes dynamism, whereas mainstream analysis emphasizes static structure” (p. 381). Therefore, grounded theory allows one to understand the dynamic of “change” as it relates to leadership, as opposed to traditional approaches, which study leadership at one point in time. As a result of the focus on quantitative methods, there have been increased calls issued for more qualitative work on leadership (e.g., Bryman, Stephens, & a Campo, 1996; Parry, 1998).
  • 12. For this research, the choice of grounded theory as a strategy of inquiry was appropriate for several reasons. First, this is an exploratory study in that its purpose is to generate theory about network leadership strategies that is grounded in empirical evidence. Eisenhardt (1989) notes one of the strengths of grounded theory is it “produces theory which closely mirrors reality” (p. 547). The nature of grounded theory is to move from observations to the development of concepts then to theory development (Locke, 2001). Theory building grounded in empirical evidence promises to contribute to the scholarly literature in public administration and organizational theory, but at the same time be “useful to practitioners in the settings studied, providing them some understanding and control 478 JHHSA SPRING 2013 over situations they encounter on a daily basis” (Locke, 2001, p. 18). The use of grounded theory also was appropriate because the network leadership literature is underdeveloped; the theories related to network management that do exist were not systematically obtained from observations and may lack validity. Thus, more empirical studies need to be conducted (Agranoff & McGuire, 2001). The emergent theory is more likely to be empirically valid because the theory building process is so closely linked with empirical observations. DATA COLLECTION AND ANALYSIS
  • 13. Grounded theory is an iterative process during which there is interplay among data collection, analysis and theory generation. Glaser and Strauss (1967) refer to this as the constant comparative method of analysis. The idea behind the constant comparative method is that a researcher gathers data, analyzes the data, and compares them against previously collected data in order to determine variables and uncover emerging relationships between variables and categories. The overlap of data collection and data analysis serves several purposes. First, it allows the researcher to move ahead with data analysis during the data collection stage. Second, it permits researchers to be flexible with regard to things that might emerge from the data. For example, Eisenhardt (1989) notes that it enables one to make adjustments to the data collection instruments that “allow the research to probe emergent themes or to take advantage of special opportunities which may be present in a given situation” (p. 539). Finally, the constant comparative method serves as a source of validity because the process generates further data and knowledge, leading JHHSA SPRING 2013 479 to theory that is more reliable because it is more clearly defined and less abstract (Parry, 1998). In the following sub-sections, I discuss how I conducted this research. In keeping with the tenets of
  • 14. grounded theory, I have not separated data collection and analysis into separate sections; instead, I discuss them jointly. I begin by discussing the types of data or “data slices” that Glaser and Strauss (1967) recommend collecting to develop grounded theory. I then discuss the six phases of this research in light of the techniques Glaser and Strauss (1967) discuss and Strauss and Corbin (1998) elaborate on for collecting, organizing and analyzing these data slices and developing theory that is truly “grounded” in the data. Data Slices: Interviews, Field Notes, Observations and Documents Glaser and Strauss (1967) advocate gathering “slices of data”—which others refer to as “triangulation”— as a means of understanding conceptual categories from different vantage points. Caudle (1994, p. 89) defines triangulation as “the combining of methods, data sources, and other factors in examining what is under study” in order to determine whether or not they are congruent and/or complementary. The nature of this research was to uncover recurring patterns and to describe the administrative processes, activities, and resources involved in the development of standards in a network setting. Grounded theory, as distinguished from other forms of qualitative research such as phenomenology, demands that researchers consider multiple forms of data (Suddaby, 2006). In order to develop theory that takes into account multiple perspectives and different types of data, I collected data from a variety of sources, including one-on-one interviews, field notes, observations and NQF-related documents.
  • 15. 480 JHHSA SPRING 2013 Interviews. Thirty-nine interviews informed this research. Of these, I conducted semi-structured interviews with 21 individuals who were active in the NQF during its formative years. Of the 25 people I contacted, 19 agreed to an interview, three said no (one gave no reason for saying no, the other two individuals said that s/he was too busy and his/her agency would not allow him/her to be interviewed), two did not respond, and one referred me to another person, who I interviewed. A colleague also was conducting her research about the NQF. Since both of our studies were investigating aspects of the NQF as a network organization and our lines of questioning and interview protocol were similar, she and I shared the interviews that we had conducted and transcribed. She shared 18 interviews with me. I analyzed and coded these as I did my own interviews. Strauss and Corbin (1998) refer to this type of sharing and coding data sets “secondary analysis” and state a “researcher building theory can code these materials as well, employing theoretical sampling in conjunction with the usual coding procedures” (p. 213). Glaser and Strauss (1967) recommend theoretical sampling of different groups to maximize the similarities and differences of information. Therefore, the interviewees were representative of the diverse organizations that belong to the NQF and consisted of individuals who were involved at all levels of the NQF, including NQF staff members, and those who served on the Board of Directors, the Never Events Steering Committee and each of the four Member Councils (Consumers, Purchasers, Providers, and Research and Quality Improvement Organizations).
  • 16. The interviewees initially were contacted by phone or e-mail about participating in the study. Whether by phone or e-mail, I introduced myself, provided them with information about the project, and asked them if they would be willing to participate in an interview. The interviews occurred either by phone or in person. Each interview JHHSA SPRING 2013 481 lasted approximately one hour, and, in many cases, quite a bit longer. In order to ensure anonymity, I have not divulged the names of the individuals I interviewed or mentioned their names or positions in the text. I gathered additional contacts using snowball or chain sampling. In snowball sampling, interviewees are asked to provide other names of individuals who know about the issue (Caudle, 1994). Different stages of theory development demand different interview techniques (Polit & Beck, 2004; Wimpenny & Gass, 2000). Glaser and Strauss (1967) state that during the initial period of data collection and analysis, interviews may take the form of unstructured conversations and, as the theory begins to emerge from the data, the interviews will become more focused and structured. During the initial phases of my data collection, the interviews tended to be more conversational and broadly focused and I developed an initial interview guide that reflected this. As the theory began to emerge, I developed an interview guide in which the questions were more focused than they were initially. The interviews themselves became more structured. Fielding (1994) notes that some of the strengths of semi-structured interviews are that they
  • 17. allow the researcher to ask questions in the same way each time, while allowing for flexibility in the sequence of questions and the depth of exploration. Throughout the process, I taped and transcribed each of the interviews after asking a subject for his or her consent. All of the interviewees consented to being taped. After I completed each interview, I transcribed it into an MS Word document and uploaded it into QSR N6. Richards and Richards (1994) maintain that software such as QSR N6, NVivo, and Atlas/ti is essential to maintaining precision and rigor in data analysis. After I uploaded the interview into QSR N6, I began coding it; I elaborate on this process in later sections. 482 JHHSA SPRING 2013 The one-on-one interviews not only allowed me to gather information about the specific management strategies the NQF used to manage the development of standards but also permitted me to observe the body language and tone of voice of the network managers and members and the physical setting of the NQF. From the interviews I gleaned quotes and gathered opinions and information about how the participants interacted within the network. I used “memoing” to record thoughts, interpretations, questions and directions for further data collection (Strauss & Corbin, 1998). These memos were written to explore what was emerging from the data, what I was learning from the literature, and how I linked the two in developing an interview guide and theory.
  • 18. Field notes. Field notes are an important part of grounded theory research because they allow a researcher to record observations and thoughts about the research process and topic as the research progresses. Eisenhardt (1989) recommends writing down impressions and asking such critical questions as “What am I learning?” and “How does this case differ from the last?” after interviews and observations. I kept two types of field notes: a set for interviews and a set of notes outlining what I observed at the two NQF Annual Meetings I attended. As part of the interview process, I kept records of notes that I took during the interviews. I also took time immediately after I completed each interview to record my impressions and thoughts about what I learned from the interview. While attending the NQF Annual Meetings, I took notes about the issues discussed at the meetings, differing opinions and who raised them, Kizer’s representation of the NQF, and my reactions to and thoughts about various events and topics discussed. JHHSA SPRING 2013 483 Written documents. I also gathered and analyzed documents related to the NQF, including working papers about the NQF’s first project—the “Never Events” project—minutes from committee meetings, and briefing materials. In order to gain access to these documents, I contacted the NQF’s staff members and executive officers involved in overseeing the “Never Events” project as well as
  • 19. individuals involved in the development of the consensus report. A confidential source close to the NQF also provided me with many financial and other documents pertaining to the NQF’s creation and the Never Events project. I also collected data from public sources, including newspaper and journal articles, speeches Kizer gave that were available on the Internet and information from the NQF’s web site. One can learn a great deal about the organizational structure, operations, history and philosophy of an organization through the examination of written documents, and these documents provided me with a strong sense and appreciation of the NQF as an organization. I used these documents to provide me with information about reports I might want to obtain and the individuals I might want to contact for interviews during the initial stages of my research. Observation. I also attended and observed the proceedings of two NQF Annual Meetings. I attended the two meetings for several reasons. First, they gave me an opportunity to observe first-hand how the NQF conducts business. Second, I was able to meet people and question them informally about the NQF at these meetings. Third, as the research progressed and leadership became the focal point of the study, the meetings gave me a chance to observe Kizer in action and determine whether what I was observing matched with what I was hearing from the interviewees. Finally, the annual meetings gave me a 484 JHHSA SPRING 2013
  • 20. chance to learn about and keep up-to-date on the various issues affecting the NQF and its operations. The Research Phases: Collecting, Analyzing and Developing Theory Glaser and Strauss (1967) do not prescribe how to conduct research using the grounded theory method in their seminal work. Strauss and Corbin (1998), however, elaborate on the original work and outline some steps for conducting research using grounded theory: open coding, axial coding, and selective coding. Strauss and Corbin (1998) state that the process is “a free-flowing and creative one in which analysts move quickly back and forth between types of coding, using analytic techniques and procedures freely and in response to the analytic task before analysis” (p. 58). Since I was new to grounded research, I followed the approach outlined by Strauss and Corbin (1998). I conducted this research in six phases and delineate the tasks I undertook for each phase of the data collection and analysis process in the following sections. Phase one: Initial contact with the NQF and immersion in the health care literature. I began the project by establishing contact with NQF staff and Dr. John Eisenberg, then Director of the Agency for Healthcare Research and Quality (AHRQ)—which provided some of the initial funding for the NQF. I read widely about the health care system, including the history of health care in the United States (Starr, 1984; Millenson, 1997); the history of quality improvement efforts (Brennan & Berwick, 1996); quality problems in health care (President’s Advisory Commission, 1998; Institute of Medicine, 1999, 2001), including research and information
  • 21. about medical errors and patient safety (Bogner, 1994) and quality initiatives underway in the health care industry. I also read about high-reliability systems and human error JHHSA SPRING 2013 485 (Perrow, 1999; Reason, 1990) and error-reporting systems and quality improvement efforts underway in other industries, including the aviation, nuclear and chemical industries (Rees, 1994; Gunningham & Rees, 1997). Phase two: Literature review and development of initial research questions. During Phase Two, I narrowed the focus of my study to the NQF and its role as a network organization charged with coordinating quality improvement efforts in the health care industry. I also began to read literature about networks and network management. One of the common misperceptions about grounded theory is that a researcher should come into the research as a “blank slate” with no prior immersion in or knowledge about the literature (Suddaby, 2006, p. 634). However, Glaser and Strauss (1967) argue for a link between substantive theory, or the theory associated with a particular subject area, and the generation of grounded formal theory: We believe that although formal theory can be generated directly from the data, it is more desirable, and usually necessary, to start the formal theory from a substantive one. The latter not only provides a stimulus to a ‘good idea’ but it also gives an initial
  • 22. direction in developing relevant categories and properties and in choosing possible modes of integration. Indeed it is difficult to find a grounded formal theory that was not in some way stimulated by substantive theory (p. 79). From this literature review, I identified the broad questions that guided the research questions during the preliminary phases of this project: (1) how are these new 486 JHHSA SPRING 2013 organizational forms (i.e., networks) managed? and (2) what is the U.S. national government’s role in this process? While these two questions outlined the broad purpose of this study, I developed the following questions to guide me initially as I gathered specific information about the NQF: 1. How and why was the NQF created? 2. How is the NQF organized? 3. How does the NQF manage the development of standards? 4. What is the federal government’s role in this process? 5. What lessons does NQF’s administrative experiment hold for students of public administration? From my initial literature review and document
  • 23. collection efforts, I developed a preliminary interview guide that I used for conducting the initial exploratory interviews. Since the process was exploratory, the interview questions served as probes to generate data that I later tied-back to the existing literature during Phase Three. Phase three: Initial interviews and identification of the emergent themes through open coding. During Phase Three, I conducted, coded, and began to analyze the initial exploratory interviews and continued collecting documents related to the NQF. I interviewed seven individuals involved in the “Never Events” project. Strauss and Corbin (1998) state that the first step in the process of theory building is the development of concepts. The initial interviews allowed me to begin the process of organizing and interpreting the data. Open coding is the “process through which concepts are identified and their properties and dimensions are discovered in data” (Strauss & Corbin, 1998, p. 101). JHHSA SPRING 2013 487 During open coding, “data are broken down into discrete parts, closely examined, and compared for similarities and differences” (Strauss & Corbin, 1998, p. 102). The process enables researchers “to group similar events, happenings, and objects under a common heading or classification” (Strauss & Corbin, 1998, p. 103). Researchers can analyze documents by line, by sentence or paragraph, or as a whole (Strauss & Corbin, 1998). From there, categories are identified and their properties and dimensions are specified
  • 24. (Strauss & Corbin, 1998). To assist me with the coding process, I used QSR N6. One of the strengths of using qualitative software is that it allows the themes to emerge from the interviews. As I coded the interviews sentence by sentence, I began to pull common themes from them and group them into broad categories. As I coded these interviews, the broad theme of leadership and, more specifically, Kizer’s leadership in creating and building the NQF, consistently emerged. Since the NQF was a relatively new organization, I began to think about the role of a leader in building a network organization. I developed the following question to guide me: “What are some of the key tasks a leader engages in to create a network organization?” Since I had initially started the research with a broad area for investigation, network management, asking these questions effectively allowed me to narrow the scope and focus of my research and to develop a more finely tuned research question. This is in keeping with Strauss and Corbin (1998), who state, “Although the initial question starts outs broadly, it becomes progressively narrowed and more focused during the research process as concepts and their relationships are discovered” (p. 41). One way to investigate phenomena and develop sensitivity or insight into the data and the concepts being developed is to examine the literature for relevant information (Strauss & Corbin, 1998). Eisenhardt (1989) 488 JHHSA SPRING 2013
  • 25. explains the importance of looking at a broad range of literature when developing theory: An essential feature of theory building is comparison of the emergent concepts, theory, or hypotheses with the extant literature. This involves asking what this similar to, what does it contradict, and why. A key to this process is to consider a broad range of literature (p. 544). Furthermore, Eisenhardt (1989) argues: “While linking results to the literature is important in most research, it is particularly crucial in theory-building research because the findings often rest on a very limited number of cases” (p. 545). It is important to look at two types of literature— those that conflict with the findings and those that agree with the findings. The former allows one to be more creative and groundbreaking, and “the result can be deeper insight into both the emergent theory and the conflicting literature, as well as sharpening the limits of generalizability of the focal research” (Eisenhardt, 1989, p. 544). I therefore looked at the existing leadership and network management literatures to assist me with the initial conceptualization of “network leadership” and the possible tasks a leader engages in to create a network organization. Comparing the findings to extant literature in a different area with similar findings allows a researcher to tie “together underlying similarities in phenomena normally not associated with each other. The result is often a theory with stronger internal validity, wider generalizability, and higher conceptual level” (Eisenhardt, 1989, p. 544). I started looking at the leadership literature in order to
  • 26. determine which area of the literature fit with my project. Since the interviewees discussed extensively the tasks that Kizer engaged in to get the NQF up-and-running, I decided JHHSA SPRING 2013 489 to focus on and pull concepts from studies that outline the tasks, activities, and roles of leaders; that is, what it is that leaders actually do and the skills that are needed to accomplish their goals. For example, Selznick (1984) in his classic work, Leadership and Administration, delineates some of the critical tasks a bureaucratic leader might undertake in order to build an organization and its institutional character and culture, and Doig and Hargrove (1987) examine public sector leadership and discuss the leadership tasks undertaken by leaders during the formative stages of organizational development. Phase four: Refinement of the interview guide and the development of subcategories through axial coding. During Phase Four, I conducted and analyzed additional interviews and attended an annual meeting. After I conducted the initial interviews and started to extrapolate themes, I turned to the literature to help me with the development of a more focused interview guide. The guide I developed covered the following topics: the role of the member organizations in the NQF, the Never Events project, key organizational actors in the NQF’s environment, the NQF’s Board of Directors, the Member Councils, the NQF’s staff, the role of professional expertise in the NQF, Kizer’s role in the NQF, and the NQF’s challenges and accomplishments. I used the in-depth interview instrument of open-ended
  • 27. questions as a guide when interviewing participants. During this phase, I engaged in axial coding, which is the “process of relating categories to their subcategories, termed ‘axial’ because coding occurs around the axis of a category, linking categories at the level of properties and dimensions” (Strauss & Corbin, 1998, p. 123). The purpose of axial coding is “to begin the process of reassembling data that were fractured during open coding” (Strauss & Corbin, 1998, p. 124). Strauss and Corbin (1998) identify several tasks associated with axial coding: 490 JHHSA SPRING 2013 1. Laying out the properties of a category and their dimensions, a task that begins during open coding 2. Identifying the variety of conditions, actions/interactions, and consequences associated with a phenomenon 3. Relating a category to its subcategories through statements denoting how they are related to each other, and 4. Looking for cues in the data that denote how major categories might relate to each other (p. 126). I began to ask questions about the larger categories (i.e., the three critical tasks a network leader engages in to build a network organization) that were emerging from the data: defining the mission, building a social base, and managing diverse interests through the consensus development
  • 28. process. These questions allowed me to develop subcategories that explain each category in greater detail. According to Strauss and Corbin (1998), “subcategories answer questions about the phenomenon such as when, where, why, who, how, and with what consequences, thus giving the concept greater explanatory power” (p. 125). Phase five: Refinement of the theory through selective coding. During Phase Five, I attended another annual meeting and engaged in selective coding. Selective coding is the “process of integrating and refining the theory” (Strauss & Corbin, 1998, p. 143). Integration involves organizing categories “around a central explanatory concept” (Strauss & Corbin, 1998, p. 161). Strauss and Corbin (1998) outline several tools that can be used to assist with integration: telling or writing the storyline, using diagrams, sorting and reviewing memos, and using computer programs. After integration, the researcher begins JHHSA SPRING 2013 491 to refine the theory. “Refining the theory consists of reviewing the scheme for internal consistency and for gaps in logic, filling in poorly developed categories and trimming excess ones, and validating the scheme” (Strauss & Corbin, 1998, p. 156). In this case, I wrote about the leadership tasks interviewees maintained that Kizer engaged in, using the memos I had written to assist me with developing the narrative about the leadership tasks involved in creating an NAO. As part of the integration phase, I compiled my findings into a conference paper. The conference presentation enabled me to obtain reactions to my findings and refine my data further.
  • 29. Phase six: Closure. Strauss and Corbin (1998) encourage the researcher to consider three things when deciding to conclude data collection and analysis: time, money and, most importantly, theoretical saturation. Although the first two issues are self-explanatory, the third deserves an explanation. In order to reach closure, Eisenhardt (1989) maintains that researchers should constantly ask themselves two important questions. “When should I stop adding cases?” and “When should I stop moving between data collection and analysis?” The answer to both is theoretical saturation, which Strauss and Corbin (1998, p. 143) define as “The point in category development at which no new properties, dimensions, or relationships emerge during analysis.” There is nothing new that can be added through further sampling; that is, collecting further information will not enhance the categories and their properties any further. Glaser and Strauss (1967, p. 224) maintain that closure should occur “When the researcher is convinced that his [sic] conceptual framework forms a systematic theory, that it is a reasonably accurate statement of the matters studied, that it is couched in a form possible for others to use in studying a similar area, and that he can publish is results with confidence, then he is near the end of his research.” I 492 JHHSA SPRING 2013 stopped collecting data when I started to hear the same stories and examples from interviewees. I also had a well- developed theoretical framework and found it difficult to collect information that would shed additional light on it.
  • 30. LIMITATIONS One concern associated with grounded theory and this study is whether the findings are transferable. While Glaser and Strauss (1967) do not discuss this issue directly, they discuss credibility and state: “The reader’s judgment of credibility will also rest upon his assessments of how the researcher came to his conclusions. He will note, for instance, what range of events the researcher saw, whom he interviewed, who talked to him, what diverse groups he compared, what kinds of experiences he had, and how he might have appeared to various people whom he studied” (p. 231). Locke (2001), however, notes that by gathering diverse data observations, the general applicability or analytic generalizability of the theory can be extended. Another concern is the subjectivity of the researcher. That is, the researcher becomes the primary measurement instrument in the investigative process, in contrast to that of quantitative research where the researcher tries to stay removed from the process (Caudle, 1994). In grounded theory, one must let the theory emerge from the data. This is not an easy task, especially considering that researchers bring their own sets of biases and expectations to research, but an astute grounded theorist recognizes and is sensitive to bias. In order to counteract researcher bias, a researcher needs to present
  • 31. JHHSA SPRING 2013 493 evidence that corroborates the data (Caudle, 1994). One way to do this is to gather multiple perspectives and documents about the same incident (Eisenhardt, 1989). By doing so, validity is enhanced because one is relying on more than one person (and more than one document) to provide an understanding of the events that occurred. Lincoln and Guba (1985) also recommend that the researcher find someone to examine the research findings and play “devil’s advocate.” In order to address these issues, I asked several individuals to serve as my devil’s advocates. A third concern relates to the interview process and document analysis. Once interviews are granted, there is a concern with being able to move beyond “scripted” responses in order to get the “real” story. Potential problems related to document analysis include identifying the relevant documents and, once identified, gaining access to those documents. Another concern is whether or not the documents reflect reality. That is, do they accurately reflect decision processes and decisions or were they written to protect individuals? For example, one concern might be that the minutes might not have been written in a way that reflects the actual discussions and debates that occurred. Another concern is whether minutes and memos contain more than cursory information. In order to address these concerns, I collected as many documents as possible and spoke to a wide variety of individuals to verify that the stories I had heard were indeed accurate. A final concern is with the reliability or
  • 32. dependability of the research (Neuman, 2003). The concern with a study’s reliability can be remedied with replication. In qualitative research, however, nothing remains static; that is, reality is constantly changing, making replication difficult. Furthermore, it is impossible to replicate such things as semi-structured interviews. Qualitative researchers argue that because processes are not stable over 494 JHHSA SPRING 2013 time and the research process itself is supposed to be dynamic the preoccupation of “positivist” researchers with regard to replication is unfounded (Neuman, 2003; Chenitz & Swanson, 1986; Denzin, 1970). Indeed, Chenitz and Swanson (1986) point out that replication is not important to grounded theory. They maintain it is more important that researchers be able to use the grounded theory to explain, understand and predict phenomena in similar situations. CONCLUSION AND LESSONS LEARNED Janesick (1998) uses the metaphor of dance to describe qualitative research. Grounded theory also exemplifies the metaphor of dance in that it is an iterative, creative process, which lends itself to experimentation and exploration of concepts and ideas. During this process, I learned five lessons about using grounded theory to investigate the “black box” of network leadership. First, grounded theory is not easy to master. There
  • 33. are few prescriptions for how to conduct grounded theory research. In my experience, Suddaby (2006) is correct in observing: “The seamless craft of a well-executed grounded theory study…is the product of considerable experience, hard work, creative and, occasionally, a healthy dose of good luck” (p. 639). Furthermore, many researchers have found that competence in using grounded theory techniques improves over time and with experience (Suddaby, 2006). Learning to use grounded theory techniques requires patience, flexibility, the ability to tolerate ambiguity and time. The constant movement between data analysis and data collection requires patience. Developing grounded theory also demands that the researcher be able to remain flexible and responsive to emerging themes. It requires flexibility in the sense that one must be willing to follow the data’s recommendations and pursue an unintended line of inquiry. A researcher therefore JHHSA SPRING 2013 495 also must be comfortable with ambiguity in the research process. Since the data drive the direction of the research and the lines of inquiry, grounded theory cannot be “mapped” in advance. Researchers who must “map” the research path ahead of time may have some difficulty conducting research using a grounded theory approach. These characteristics also mean that grounded theory research is time-consuming. Secondly, grounded theory research requires a process. One of the benefits of conducting grounded theory research is that it leads to fresh insights about the social phenomenon under investigation. Achieving this requires
  • 34. researchers to be intuitive, flexible, and open-minded. This does not mean, however, that when conducting grounded theory research that “anything goes” (Suddaby, 2006; Jones & Noble, 2007). Although I certainly found that there is tension between creativity and the rigorous application of formal rules in conducting grounded theory, the perception that grounded theory is an excuse to throw methodological rigor out the window is wrong. Suddaby (2006) notes that in evaluating grounded theory research, he checks that a researcher has followed the core analytic tenets of grounded theory, including theoretical sampling, constant comparison, theoretical sensitivity, and the technical language a researcher uses to describe the research process is accurate, because he believes “there is a clear connection between rigor in language and rigor in action” (p. 640). Through this research I learned that being transparent about how I collected, coded and analyzed my data is as important in qualitative research as it is in quantitative research. Thirdly, qualitative software programs are helpful in conducting grounded theory research. A grounded theory approach can leave one feeling inundated by tons of data that can be characterized as thematically diverse. I found that using a software program, in particular QSR N5 and 496 JHHSA SPRING 2013 later N6, helped to counteract the feeling that I was “drowning in data” by providing me with the tools to organize and analyze the data efficiently. Although I ultimately decided how to interpret the data and which categories to focus on, QSR N5 and N6 allowed the
  • 35. categories and themes to emerge from the data. The programs, however, had too many “bells and whistles” that I did not use and was a bit complex for my research needs. Fourthly, transcribing my own interviews was essential to understanding the data. The more exposure one has to the data, the more familiar it becomes and the more likely the researcher will be able to “listen to” and “hear” what the data are trying to tell her. When one is conducting an interview, one is more focused on asking the questions and guiding the interview than on analyzing what is actually occurring during an interview (tone of voice, body language, etc.). Similarly, if one does not transcribe their own interviews but reads a transcription, one misses “hearing” the interview and the subtle cues and insights that might be conveyed by listening to the interview. Finally, and perhaps most importantly, grounded theory has contributed substantially to my personal growth as a scholar and researcher. Strauss and Corbin (1998) outline the characteristics of a grounded theorist and emphasize that these skills do not need to be developed prior to engaging in grounded theory research: • The ability to step back and critically analyze situations. • The ability to recognize tendency toward bias. • The ability to think abstractly. • The ability to flexible and open to helpful criticism. • Sensitivity to the words and actions of
  • 36. respondents. JHHSA SPRING 2013 497 • A sense of absorption and devotion to the work process (p. 7). To this list, I would add intuition. I have always been very intuitive and able to identify themes, and grounded theory enabled me to draw on these strengths. As a new researcher, conducting grounded theory research refined and sharpened my ability to identify and ask broader research questions and connect these questions to the broader scholarly literature in the areas of network management and leadership. Strauss and Corbin (1998), however, neglect to mention one important aspect of the research process that the grounded theory approach, and qualitative methods more generally, help new researchers develop: developing and designing interview questions and guides and conducting interviews. As a new researcher, this process, with its emphasis on constant comparison between data collection and analysis, helped me to develop and fine-tune relevant questions. Furthermore, when I began this research, I found it difficult and stressful to conduct interviews. With more experience, I became more comfortable with the interview process.
  • 37. 498 JHHSA SPRING 2013 REFERENCES Agranoff, R. (2004, March). Inside the Network Operation. Paper presented at the annual conference of the American Society for Public Administration. Portland, OR. Agranoff, R., & McGuire, M. (2001). After the network is formed: Process, power, and performance.” In M. P. Mandell (Ed.), Getting results through collaboration: Networks and network structures for public policy and management (pp. 11-29). Westport, CT: Quorum Books. Blumer, H. (1969). Symbolic interactionism. Englewood Cliffs, NJ: Prentice Hall. Bogner, M. S. (Ed.). (1994). Human error in medicine. Hillsdale, NJ: Lawrence Erlbaum Associates. Brennan, T. A., & Berwick, D. M. (1996). New rules: Regulation, markets, and the quality of American health care. San Francisco: Jossey-Bass Publishers. Bryman, A., Stephens, M., & a Campo, C. (1996). The
  • 38. importance of context: Qualitative research and the study of leadership. The Leadership Quarterly, 7, 353-370. Castells, M. (2000). The rise of the network society (2nd ed.). Malden, MA: Blackwell Publishers. Caudle, S. L. (1994). Using qualitative approaches. In J. S. Wholey, H. P. Hatry, & K. E. Newcomer (Eds.), Handbook of practical program evaluation (pp. 69- 95). San Francisco: Jossey-Bass Publishers. JHHSA SPRING 2013 499 Chenitz, W. C., & Swanson, J. M. (Eds.). (1986). From practice to grounded theory: Qualitative research in nursing. Menlo Park, CA: Addison Wesley Publishing Company. Creswell, J. W. (2003). Research design: Qualitative, quantitative, and mixed methods approaches. Thousand Oaks, CA: Sage Publications. Daft, R. L., & Lewin, A. Y. (1993). Where are the theories for “new” organizational forms? An editorial essay.
  • 39. Organization Science, 4, i-vi. Denzin, N. K. (1970). The research act: A theoretical introduction to sociological methods. New York: McGraw-Hill. Denzin, N. K. (1994). The art and politics of interpretation. In N. K. Denzin & Y. S. Lincoln (Eds.), Handbook of Qualitative Research (pp. 500-515). Thousand Oaks, CA: Sage Publications. Doig, J. W., & Hargrove, E. C. (Eds.). (1987). Leadership and innovation: A biographical perspective on entrepreneurs in government. Baltimore, MD: The Johns Hopkins University Press. Eisenhardt, K. (1989). Building theories from case study research. The Academy of Management Review, 14, 532-550. Fielding, N. (1994). Varieties of research interviews. Nurse Researcher, 1, 4-13.
  • 40. 500 JHHSA SPRING 2013 Glaser, B. G. (1992). Basics of grounded theory analysis: Emergence versus forcing. Mill Valley, CA: Sociology Press. Glaser B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. New York: Aldine Publishing Company. Goldsmith, S., & Eggers, W. D. (2004). Governing by network: The new shape of the public sector. Washington, DC: Brookings Institution Press. Gunningham, N. & Rees, J. V. (1997). Industry self- regulation: An institutional perspective. Law & Policy, 19, 363-414. Hoflund, A. B. (2012a, forthcoming). Designing a Decision-Making Process for a Network Administrative Organization: A Case Study of the National Quality Forum's Consensus Development Process. Public Organization Review. Hoflund, A. B. (2012b). Building a Network
  • 41. Administrative Organization’s Social Base: Lessons From the National Quality Forum, Administration & Society, first published on February 16, 2012 as doi:10.1177/0095399711433695. Hoflund, A. B., & Farquhar, M. B. (2008). Challenges of Democratic Experimentalism: A Case Study of the National Quality Forum in Health Care. Regulation and Governance, 2, 121-135. Hunt, J. G. (1991). Leadership: A new synthesis. Newbury Park, CA: Sage. JHHSA SPRING 2013 501 Hunt, J. G., & Ropo, A. (1995). Multi-level leadership: Grounded theory and mainstream theory applied to the case of general motors. Leadership Quarterly, 6, 379-412. Institute of Medicine. (1999). To err is human: Building a safer health system. Washington, DC: National Academy Press. Institute of Medicine. (2001). Crossing the quality chasm:
  • 42. A new health system for the 21st century. Washington, DC: National Academy Press. Janesick, V. J. (1998). The dance of qualitative research design: Metaphor, methodolatry, and meaning. In N. K. Denzin & Y. S. Lincoln (Eds.), Strategies of qualitative inquiry (pp. 35-55). Thousand Oaks, CA: Sage Publications. Jones, R., & Noble, G. (2007). Grounded theory and management research: a lack of integrity? Qualitative Research in Organizations and Management: An International Journal, 2, 84-103. Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. Newbury Park, CA: Sage Publications. Locke, K. (2001). Grounded theory in management research. Thousand Oaks, CA: Sage Publications. Marshall, C., & Rossman, G. B. (1999). Designing qualitative research. Thousand Oaks, CA: Sage Publications.
  • 43. 502 JHHSA SPRING 2013 McGuire, M., & Agranoff, R. (2007, October). Answering the big questions, asking the bigger questions: Expanding the public network management empirical research agenda. Paper presented at the 9th Public Management Research Conference. Tucson, AZ. Millenson, M. L. (1997). Demanding medical excellence. Chicago: University of Chicago Press. Neuman, W. L. (2003). Social research methods: Qualitative and quantitative approaches. (5th ed.). Boston: Allyn & Bacon. Parry, K. W. (1998). Grounded theory and social process: A new direction for leadership research. The Leadership Quarterly, 9, 85-105. Patton, M. Q. (1987). How to use qualitative methods in evaluation. Newbury Park, CA: Sage Publications. Perrow, C. (1999). Normal accidents: Living with high-risk technologies. Princeton, NJ: Princeton University Press.
  • 44. Polit, D. F., & Beck, C. T. (2004). Nursing research: Principles and methods. New York: Lippincott, Williams, & Wilkins. President’s Advisory Commission on Consumer Protection and Quality in the Health Care Industry. (1998). Quality first: Better health care for all Americans. Retrieved October 30, 2011 from http://www.hcqualitycommission.gov/final/ JHHSA SPRING 2013 503 Reason, James T. (1990). Human error. New York: Cambridge University Press. Rees, J. V. (1994). Hostages of each other: The transformation of nuclear safety since Three Mile Island. Chicago: University of Chicago Press. Richards, T. J., & Richards, L. (1994). Using computers in qualitative research. In N. K. Denzin & Y. S. Lincoln, (Eds.), Handbook of qualitative research,
  • 45. (pp. 445–462). Thousand Oaks, CA: Sage Publications. Rubin, E. L. (2005). Beyond Camelot: Rethinking politics and law for the modern state. Princeton, NJ: Princeton University Press. Selznick, P. (1984). Leadership in administration: A sociological interpretation (Rev. ed). Berkeley, CA: University of California Press. Starr, P. (1984). The social transformation of American medicine. New York: Basic Books. Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory. Thousand Oaks, CA: Sage Publications. Suddaby, R. (2006). From the Editors: What grounded theory is not. Academy of Management Journal, 49, 633-642.
  • 46. 504 JHHSA SPRING 2013 Wimpenny, P., & Gass, J. (2000). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing, 31, 1485- 1492. Copyright of Journal of Health & Human Services Administration is the property of Southern Public Administration Education Foundation and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. 12-1 Chapter 12 Enhancing Decision Making “Companies have been able to use technology to do some very cool stuff to reach customers in new ways, to automate operations. But one thing many businesses haven’t
  • 47. been able to do easily is use the data they’ve collected to find and stamp out waste across operations. Sifting through corporate data was supposed to make executives more efficient. Much of the time, though, it’s just made them more confused.” (Fortune, March 3, 2002) Even though this quote is ten years old, it’s still pertinent in many companies. We’re getting better though about turning raw data into useful information that helps improve decision making. 12.1 What are the different types of decisions and how does the decision-making process work? How do information systems support the activities of managers and management decision making? Each of us makes hundreds of decisions every day. If just a fraction of those decisions could be improved through better and more information and better
  • 48. processes, we’d all be delighted. Businesses feel the same way. Customers would be happier, employees would be more motivated, and managers would have an easier job. Most of all, businesses could improve their profitability to the benefit of all. Business Value of Improved Decision Making Table 12.1 provides a few examples of the dollar value that enhanced decision making would give to firms. 12-2 Don’t be misled into thinking that the dollar value of improving decision-making processes is limited to managers. As more business flatten their organizational structures and push decision making to lower levels, better decisions at all levels can lead to
  • 49. increased business value. Types of Decisions There are generally three classifications of decisions: nonroutine situations. Usually made at senior levels of management. th definite procedures for making the decision. Usually made at the lowest organizational levels. middle managers. Figure 12.1 couples these three types of decisions with the appropriate management level. 12-3 Figure 12.1 Information Requirements of Key Decision-Making Groups in a Firm
  • 50. business information but also external industry and society changes; decisions affect long-term, strategic goals and the firm’s objectives. resource allocation, short- range plans, and performance of specific departments, task forces, teams, and special project groups. onal management and project teams: Decisions affect subunits and individual employees regarding the resources, schedules, and personnel decisions for specific projects. other employees, and most importantly, the customer. The Decision-Making Process Making decisions requires four steps:
  • 51. problems. ing among solution alternatives. monitoring how well the solution is working. These four steps are not always consecutive and may well be concurrent or repetitive. 12-4 Managers and Decision Making in the Real World Although information systems have gone a long way toward improving the decision- making process, they are not the Holy Grail. They should be viewed as a way to assist managers in making decisions, but not as the final answer.
  • 52. Managerial Roles Let’s compare the classical model of management with the behavioral model. The former describes the five classical functions of managers as: Behavioral models of managers dissect the many activities involved in the five functions of management. That is, managers: ation. documentation.
  • 53. Now, let’s take all of these activities and categorize them into three managerial roles: leaders, and liaisons. spokespersons. allocate resources, negotiate and mediate conflicts. Table 12.2 shows that supporting information systems exist for only some of the managerial behaviors but not all of them. 12-5 Table 12.2 Managerial Roles and Supporting Information Systems Real World Decision Making Because you have no doubt had to make decisions in the real world, you know for a fact
  • 54. that the process is not as cut-and-dried as what we’ve reviewed so far. Three reasons why the whole process can blow up without a moment’s notice: decision accurate, consistent, complete, valid, timely, accessible, and of high integrity? What if you were making a decision about purchasing a house and found out that there were errors in your credit record that prevented you from obtaining the necessary financing? Perhaps the data was out of date or contained mistakes. personal filters and biases. Managers are no different. For instance, you may suggest to your manager that the department purchase a piece of equipment from a certain manufacturer. Your manager disapproves the suggestion because he had a bad experience with that company ten years ago. The manager’s bias negates the fact that the company has
  • 55. since improved and is the best and cheapest choice. will sometimes do whatever they can to keep the status quo. Decision makers are no different especially if they stand to lose. What if your department will benefit from improving its business processes to the benefit of all concerned except that the manager will lose her job? It’s likely the manager will not make decisions that will cause her to lose her job. Therefore, nothing gets done regarding improving processes. 12-6 High-Velocity Automated Decision Making What if your friend asked you to find a copy of the lyrics to the Beatles hit song “Hey Jude?” How long do you think it would take you if Internet- based search processes were
  • 56. not available? Days? Weeks? A Google search for the information takes less than five seconds. That’s the power of high-velocity automated decision making in today’s world. Humans simply can’t match a computer’s speed and accuracy for making some decisions. Computer programmers use the same four step decision-making process we’ve discussed before when they create algorithms that help make these kinds of lightning-fast decisions: identify the problem, design a method for finding a solution, define a range of acceptable solutions, and implement the solution. They just have to be careful that the algorithms are written correctly to ensure proper decisions are made by computers or you may end up getting a profile of Jude Law, the actor. Earlier we mentioned a class of decisions that are routine, very structured, and have definite procedures for determining the solution. In these situations, why not automate the process and have a computer make the decision much faster than a human can?
  • 57. Computers have these positive characteristics that make them ideal for high-velocity automated decision making: followed -speed processors e task The algorithms are structured to follow the intelligence, design, choice, and implementation steps we discussed as part of the decision- making process. But, just in case, the information systems used to process these kinds of decisions should be monitored and regulated by humans. Bottom Line: Everyone makes decisions at all levels of an organization. The goal is to match the four decision-making organizational levels along with the three types of decisions to the appropriate kind of decision support system.
  • 58. It’s important to understand the roles and activities associated with management decision making and that information systems can only assist in the process. 12.2 How do business intelligence and business analytics support decision making? Business intelligence and business analytics provide managers with a systematic way of making sense of the vast amounts of data collected on customers, suppliers, employees, business partners, and the external business environment. 12-7 What Is Business Intelligence? All of us collect information from our surroundings, try to understand it, and then act on it in an intelligent way. Businesses are no different other than the fact that they have much more data to collect, process, store, and disseminate.
  • 59. A whole new industry has sprung up that helps businesses create an infrastructure to warehouse, integrate, report, and analyze data. This is where the databases, data warehouses, data marts, analytic platforms, and Hadoop that we discussed in previous chapters come back into the picture. Business intelligence describes how businesses collect, store, clean, and disseminate useful information to executives, managers, and employees. Business analytics, on the other hand, are the tools and techniques businesses use to analyze and understand the data in a meaningful way. It’s one thing to read a report that says sales are 10 percent ahead of last year. Business analytic tools, such as data mining, statistics, online analytical processing, and models help managers understand that part of the cause is an increased focus on marketing to middle-aged women with two children. Business Intelligence Vendors
  • 60. The top five vendors of BI and BA hardware and software include well-known technology companies: Oracle, SAP, IBM, Microsoft, and SAS. These vendors are primarily the same ones that we’ve discussed before when we reviewed enterprise systems. Perhaps the most interesting aspect of BI and BA hardware and software suites is that it’s the fastest-growing and largest segments in the U.S. software market. That demonstrates just how hungry businesses are to make sense of all the data they have available to them. The Business Intelligence Environment Let’s review six hardware, software, and management capabilities that are included in the business intelligence environment: organizing structured and unstructured data from different sources that people can analyze and use.
  • 61. process relevant data stored in transactional databases, data warehouses, or data marts. to analyze data, produce reports, respond to questions, and track their progress using key performance indicators (KPI). management and balanced scorecard methods that help managers focus on key performance indicators and industry strategic analyses. Requires strong executive oversight to ensure managers are focusing on the right issues and not just producing reports and dashboard screens because they can. 12-8 —MIS, DSS, and ESS: All the information from MIS, DSS,
  • 62. and ESS are integrated and delivered to the appropriate level of management. display data, thereby making it easy to quickly understand information on a variety of computing devices. Figure 12.3 helps you understand how these six elements work together in business intelligence and business analytics systems. Figure 12.3 Business Intelligence and Analytics for Decision Support Business Intelligence and Analytics Capabilities The days of receiving static reports that are out of date— meaning more than 30 days or even 30 minutes old—containing data that are meaningless are over. Business intelligence systems help correct that situation in five different ways:
  • 63. specific requirements. isolate impacts of parameters chosen by users. cards: Visual reports that present performance data chosen by users. reports based on data they choose. -level data summaries and then drill down to more specific data. forecasting, what-if scenario analysis, and analyze data using standard statistical tools. 12-9
  • 64. Who Uses Business Intelligence and Business Analytics? The audience for business intelligence and business analytic tools and techniques has unique characteristics depending on their management level and how they use the systems: tor organization activities using dashboards and scorecards. data along different dimensions. prepackaged reports. Figure 12.4 tells you how each division of the business intelligence audience uses the capabilities of these systems.
  • 65. Figure 12.4 Business Intelligence Users Production Reports Because 80 percent of the people who access business intelligence systems are casual users, most vendors create a mass of predefined production reports based on industry standards and best practices. Table 12.4 gives you an idea of the types of reports produced for each business functional area. 12-10 Table 12.4 Examples of Business Intelligence Predefined Production Reports Predictive Analytics Most times, customer behavior is very predictable if you’re looking at and understanding the right data. Companies use business analytic software to figure out ahead of time how
  • 66. reliable certain customers are regarding credit extensions, how customers will respond to changes in prices or services, or how successful new sales locations will be. Those are the kinds of questions predictive analytics can answer more quickly and more easily than humans. Predictive analytics helps managers ask and answer the right questions to make their company more successful. Over the last few years, many retailers have drastically reduced the number of catalogs they send in snail mail to potential customers. With rising postal fees and many people using the Internet to make purchases, fewer and fewer of them are waiting for the catalog in the mail. By using predictive analytics, companies can weed out people who are unlikely to make catalog purchases and concentrate on those who will. That decreases marketing costs while increasing the ratio of catalogs to purchasing customers. Big Data Analytics
  • 67. You’re shopping on a major retailer’s Web site when, all of a sudden, you see a sweater that you simply can’t live without. Alongside the sweater’s display are pictures of a pair of pants or skirt that, combined, will make the perfect outfit. The pants and skirt are labeled, “You might also like…” or “What other customers purchased when they purchased this sweater….” Those extra items weren’t put there by chance but more as a result of big data analytics that we discussed in earlier chapters. Rather than requiring you to thumb through pages and pages of skirts and pants, the retailer will do it for you and, in the meantime, increase the chances of making an extra sale. Those recommendations likely are a result of what 12-11 other customers purchased. The retailer captures all of its sales data, analyzes it, and includes data from social media streams to create the
  • 68. customized recommendations. Interactive Session: Technology: Big Data Make Cities Smarter (see page 480 of the text) describes how two major cities are using vast amounts of data to improve services for citizens and make city agencies more efficient. Operational Intelligence and Analytics Businesses are collecting millions of pieces of data on a constant basis from sensors, gauges, monitoring devices, and other technologies. The trick is to make good use of the data and turn it into information that employees and managers can use to make better decisions at the operational level of an organization. Operational intelligence and analytics software gives organizations the ability to analyze all of the big data as they are generated in real time. The data can feed dashboards for employees or managers and give them a heads-up about ongoing, real time operations.
  • 69. Interactive Session: Management: America’s Cup: The Tension Between Technology and Human Decision Makers (see page 483 of the text) describes how Team USA used big data in real-time operation intelligence mode to win the 2013 America’s Cup sailboat race. Ultimately, it was a balancing act between technology- driven decisions and human decision makers. Location Analytics and Geographic Information Systems (GIS) Many executive decisions depend on the availability of information, internal and external. For instance, a company that ships most of its products on trucks needs data about interstate highway access and traffic patterns to help control shipping costs and make it easier for drivers to access its warehouses. Some company policies limit business locations to high-traffic areas such as malls and similar densely populated areas. Other executive decisions revolve around data about current and potential customers and their
  • 70. geographic location. Location analytics enable companies to gain insight from the location component of data, including data from mobile phones, wireless sensors, scanning devices, location- based cameras, and maps. The data may help businesses solve problems, attract more customers, or improve services. Geographic information systems (GIS) rely heavily on demographic data from the U.S. Census Bureau. This type of decision-support system helps managers visualize geographic information more easily and make better decisions based on digitized maps. 12-12 GIS data can be coupled with an organization’s internal data to better allocate resources, money, people, time, and material.
  • 71. Management Strategies for Developing BI and BA Capabilities Is it better to select a one-stop integrated solution for your organization’s business intelligence and business analytics systems or should you adopt a multiple best-of-breed vendor solution? Be aware that your decision carries risks and rewards either way. Single vendor: The risk is that your company becomes dependent on the vendor’s pricing power. The reward is that a single vendor promises hardware and software that will work together “out of the box.” Multiple vendors: The reward is that you’ll have greater flexibility and independence in selecting your hardware and software. The risk is that you’ll suffer compatibility issues, not just between the BI hardware and software but with your other systems as well. You are locked into your decision and the switching costs are extremely high regardless of which way you decide to go.
  • 72. As a manager you must: business Bottom Line: Business intelligence and business analytics hardware and software systems help businesses warehouse, integrate, report, and analyze data from the firm’s internal and external environment. BI and BA systems provide employees, managers, and executives with a wide variety of tools and techniques that help them make sense of all the data and ultimately make better decisions. Each business must decide whether a single vendor or multiple vendors will provide the better system. 12.3 How do difference decision-making constituencies in an organization use business intelligence? What is the role of
  • 73. information systems in helping people working in a group make decisions more efficiently? At the beginning of this chapter we outlined the types of decisions made at each managerial level—structured, semistructured, and unstructured. We also mentioned that each management level has different information needs that match the type of decisions 12-13 made at that level. Let’s look at the types of information systems that match the information needs. Decision Support for Operational and Middle Management For the most part, operational managers get their information from transaction processing systems. But, more and more, they are accessing management information systems (MIS) for a broader look at their company’s performance. Middle management also relies on
  • 74. MIS systems for the bulk of their information. Here are the characteristics of a typical MIS system: e flows of data Support for Semistructured Decisions Decision support systems help executives make better decisions by using historical and current data from internal information systems and external sources of data. By combining massive amounts of data with sophisticated analytical models and tools, and by making the system easy-to-use, they provide a much better source of information to use in the decision-making process. Because of the limitations of hardware and software, early DSS systems provided
  • 75. executives only limited help. With the increased power of computer hardware, and the sophisticated software available today, DSS can crunch lots more data, in less time, in greater detail, with easy-to-use interfaces. The more detailed data and information executives have to work with, the better their decisions can be. The “what-if” decisions most commonly made by executives use sensitivity analysis models to help them predict what effect the decisions will have on the organization. Executives don’t make decisions based solely on intuition. The more information they have, the more they experiment with different outcomes in a safe mode, the better their decisions. That’s the benefit of the models used in the software tools. Common spreadsheet software such as Microsoft’s Excel helps managers review data in two dimensions rather than just one by using pivot tables. They can decipher patterns in information and help them allocate resources better. Managers using pivot tables can
  • 76. develop better strategies because they’ll gain a better sense of correlating data points. Figure 12.6 shows you a typical screen used in a Microsoft Excel pivot table. 12-14 Figure 12.6 A Pivot Table That Examines Customer Regional Distribution and Advertising Source Decision Support for Senior Management: Balanced Scorecard and Enterprise Performance Management Methods Executive support systems (ESS) are used primarily by senior management whose decisions are usually never structured and could be described as “educated guesses.” Executives rely as much, if not more, on external data than they do on data internal to their organization. Decisions must be made in the context of the
  • 77. world outside the organization. The problems and situations senior executives face are very fluid, so the system must be flexible and easy to manipulate. Executive support systems don’t provide executives with ready- made decisions. They provide the information that helps them make their decisions. Executives use that information, along with their experience, knowledge, education, and understanding of the corporation and the business environment as a whole, to make their decisions. Using a balanced scorecard method, executives combine their company’s internal financial information with additional perspectives such as customers, internal business processes, and learning and growth. By focusing on key performance indicators (KPIs) in each of these areas, executives gain a better understanding of how the organization is performing overall. After senior management establishes KPIs for each area, then and
  • 78. only then can the flow of information be established. Figure 12.7 depicts the framework for a balanced scorecard. 12-15 Figure 12.7 The Balanced Scorecard Framework Business performance management (BPM) is yet another tool for executives to systematically translate the strategy they’ve developed for their company into operational targets. BPM methods use KPIs to help users measure the organization’s progress toward the targets. BPM is similar to the balanced scorecard approach but with a stronger strategic viewpoint than an operational viewpoint. Executives often face information overload and must be able to separate the chaff from the wheat in order to make the right decision. On the other hand, if the information they
  • 79. have is not detailed enough, they may not be able to make the best decision. An ESS can supply the summarized information executives need and yet provide the opportunity to drill down to more detail if necessary. As technology advances, ESS are able to link data from various sources, both internal and external, to provide the amount and kind of information executives find useful. As common software programs include more options and executives gain experience using these programs, they’re turning to them as an easy way to manipulate information. Because of the trend toward flatter organizations with fewer layers of management, companies are employing ESS at lower levels of the organization. Flatter organizations also require managers to access more information about a wider range of activities than in the past. This requirement can be accomplished with the aid of a good ESS. Executives can also monitor the performance of their own areas and of the
  • 80. company as a whole. Group Decision-Support Systems (GDSS) More and more, companies are turning to groups and teams to get work done. Hours upon hours are spent in meetings, in group collaboration, in communicating with many people. 12-16 To help groups make decisions, a new category of systems was developed: the group decision-support system (GDSS). You’ve been there—a meeting where nothing seems to get done, where some people dominate the agenda and others never say a word, and it dragged on for hours. When it was all over no one was sure what was accomplished, if anything. But the doughnuts and coffee were good! Organizations have been struggling with this problem for years. They are now using GDSS as a way to increase the efficiency and effectiveness of meetings.
  • 81. In GDSS, the hardware includes more than just computers and peripheral equipment. It also includes the conference facilities, audiovisual equipment, and networking equipment that connect everyone. More sophisticated GDSS require meeting facilitators and other staff that keep the hardware operating correctly. Many companies are bypassing specially equipped rooms in favor of having group participants “attend” the meeting through their individual desktop computers. Now instead of wasting time in meetings, people will know ahead of time what is on the agenda. All of the information generated during the meeting is maintained for future use and reference. Because input is anonymous, ideas are evaluated on their own merit. And for geographically separated attendees, travel time and dollars are saved. GDSS are best used for tasks involving:
  • 82. Bottom Line: Executive support systems meet the needs of corporate executives by providing them with vast amounts of information quickly and in graphic form to help them make effective decisions. ESS must be flexible, easy- to-use, and contain both internal and external sources of information. The balanced scorecard method expands the view of the organization to include four dimensions: financial, business process, customer, and learning and growth. Group decision- support systems, comprised of hardware, software, and people, help streamline group meetings and communications by removing obstacles and using technology to increase the effectiveness of decisions.
  • 83. 11-1 Chapter 11 Managing Knowledge “When people leave organizations today, they are potentially taking with them knowledge that’s critical to the future of the business,” says David DeLong, a business consultant and author of Lost Knowledge: Confronting the Threat of an Aging Workforce. Whether it’s a key client relationship, mastery of an outdated computer language, or simply knowledge about where certain files are saved on a company server, every business has stored up bits of information and knowhow that isn’t written in a manual or recorded in a training video.” (BusinessWeek.com, “The Knowledge Handoff,” Douglas McMillian, Aug 26, 2008) As we’ve mentioned in other chapters, information, therefore knowledge, is becoming an important corporate resource that must be captured, protected, preserved, and grown. How you do that is the focus of this chapter.
  • 84. 11.1 What is the role of knowledge management and knowledge management programs in business? Creating and using knowledge is not limited to information- based companies; it is necessary for all organizations, regardless of industry sector. It’s not enough to make good products. Companies must make products that are better, less expensive to produce, and more desirable than those of competitors. Using corporate and individual knowledge assets wisely will help companies do that. They must harness as much knowledge as they can and make it easy to share with others. Important Dimensions of Knowledge We discussed the difference between data and information in previous chapters. The next step up from information literacy is knowledge. An organization must transform the information it gathers and put it into meaningful concepts that give it insight into ways of
  • 85. improving the environment for its employees, suppliers, and customers. Wisdom then is using information to solve problems and knowing when, where, and how to apply knowledge. You may have associated with the long-time employee that seems to know how to fix the intricate piece of machinery in his sleep. He’s been doing it for years, he would tell you. All of the knowledge he retains in his mind is tacit knowledge. On the other hand, you may have dealt with an employee who seems to grab the operating manual every time he turns around. The manual is an example of explicit knowledge— that which is documented. Table 11.1 below shows that every organization has four dimensions of knowledge: 11-2
  • 86. How it handles them is what can make the organization a successful one that seems to outrun the competition, or one that seems to muddle through the best it can. Examine your organization and determine how well it values its knowledge. Organizational Learning and Knowledge Management In the last few years, companies have downsized and flattened their organizations. Many employees who were laid off had been with these companies for years. When they walked out the door, they took experience, education, contacts, and information with them. Companies are finding out how important human resources are to their success and are
  • 87. 11-3 establishing organizational learning mechanisms to capture and use this corporate knowledge. That is, organizations gain experience by: es Successful organizations then incorporate what they’ve learned into new business processes and new management decision-making skills. The Knowledge Management Value Chain To understand the concept of knowledge management, think of knowledge as a resource, just like buildings, production equipment, product designs, and money. All
  • 88. these resources need to be systematically and actively managed. Figure 11.1: The Knowledge Management Value Chain Figure 11.1 shows you the activities that go into successfully managing knowledge from acquiring it to applying it throughout the firm. It’s not just technology related to the activities that’s important to recognize. In fact, as the text points out, technology applications of managing knowledge account for only about 20 percent. The other 80 percent deals with organizing and managing the knowledge assets. Knowledge Acquisition 11-4 Figure 11.1a: Acquiring Knowledge
  • 89. Knowledge comes from a variety of sources. Early attempts of gathering knowledge were a hodgepodge of documents, reports, and employee input. Now companies are using more sophisticated technologies to gather information and knowledge from e-mails, transaction-processing systems, and outside sources such as news reports and government statistical data. It’s important to remember that a great deal of knowledge should come from external sources because no organization exists in a vacuum. Knowledge Storage Figure 11.1b: Storing Knowledge Remember, knowledge management is a continual process, not an event. As you gather knowledge you must store it efficiently and effectively. Document management systems are an easy way to digitize, index, and tag documents so that employees can retrieve them without much difficulty. Probably the most important element of any knowledge system
  • 90. is the people that feed the machine. One of the biggest reasons knowledge systems have failed in the past is because the employees and management either didn’t place enough importance on the system or felt threatened by it. All the people in the digital firm need to realize how important a resource knowledge is and help take care of the system. 11-5 Knowledge Dissemination Figure 11.1c: Disseminating Knowledge Once you’ve built the system, acquired and stored the knowledge, you need to make it easy and efficient for employees to access the knowledge. Portals, wikis, social networks, IM, and e-mail are just some of the tools you can use to disseminate information easily and cheaply. Everyone complains nowadays of having too much information. The
  • 91. organization needs to make knowledge dissemination unobtrusive and easy to master or the employees and managers will ignore it or underutilize it. Knowledge Application Figure 11.1d: Applying Knowledge You can have all the information and knowledge you need to master any task, but if you don’t build knowledge application into every functional area and every system used throughout the organization you are doing a disservice to both the knowledge and the company. As old systems are revamped and revised or new ones built, pay attention to how you can draw knowledge into them. The digital firm also needs to explore how it can use the knowledge system to build new processes for its employees and suppliers, or new products for its customers. Once it masters that, it can outrun the competition and build a stronger organization.
  • 92. Building Organizational and Management Capital: Collaboration, Communities of Practice, and Office Environments As knowledge becomes a central productive and strategic asset, the success of the organization increasingly depends on its ability to gather, produce, maintain, and disseminate knowledge. One way companies are responding to the challenge is by appointing a chief knowledge officer. His/her responsibilities involve designing new programs, systems, and methods for capturing and managing knowledge. In some cases, the hardest part of the CKO’s job may be convincing the organization that it needs to capture, organize, and use its corporate knowledge to remain competitive. 11-6 Basically, the CKO concept is rooted in the realization that companies can
  • 93. no longer expect that the products and services that made them successful in the past will keep them viable in the future. Instead, companies will differentiate themselves on the basis of what they know and their ability to know how to do new things well and quickly. (copied from Business.com Web site, Nov 2008) No one person has all the knowledge a digital firm needs. For that you must rely on many different people from many different locations. Communities of practice (COP) are built on the idea of combining ideas and knowledge from various sources and making it available to people inside and outside the organization. Professional conferences, newsletters, journals, and online newsgroups are excellent sources of information that center on the communities of practice concept. Four areas where COP can make a difference are:
  • 94. t as a spawning ground for new knowledge Types of Knowledge Management Systems Let’s look at three major types of knowledge management systems as shown in Figure 11.2. Figure 11.2: Major Types of Knowledge Management Systems Enterprise-wide knowledge management systems are spread across the organization and offer a way to systematically complete the information system activities we just reviewed: acquiring, storing, disseminating, and applying knowledge. 11-7
  • 95. Knowledge work systems use powerful workstations that can process the huge graphics files some professionals need or to perform the massive calculations other types of professionals require. We’re not talking clip art or simple addition or subtraction. We’re talking huge amounts of data that must be processed quickly and the necessary storage capacity for large files. The workstations must also have the necessary equipment and telecommunication connections that enable the knowledge workers to connect to external sources of information via extranets, intranets, or the Internet. These systems must have system and application software that is easy-to-use and manipulate, and intuitive to learn so the workers can “get right to it.” Intelligent techniques, which we’ll look at more closely at the end of this chapter, include expert systems, neural networks, and genetic algorithms, to name a few. Bottom Line: Knowledge is an important asset that must be managed throughout
  • 96. the enterprise. Knowledge must be acquired, stored, distributed, and applied effectively and efficiently. The chief knowledge officer is responsible for ensuring that the digital firm uses its knowledge assets wisely. Communities of practice help people reuse knowledge easily and cheaply. 11.2 What types of systems are used for enterprise-wide knowledge management and how do they provide value for businesses? There are three primary types of knowledge in every organization: or presentations -mails, videos, digital pictures, or brochures With so many sources of information and knowledge available, how does an organization go about collecting, storing, distributing, and applying all of it?
  • 97. That’s what we’ll investigate in this section. Enterprise Content Management Systems Traditionally, knowledge wasn’t considered a corporate resource. Many systems were built without the necessary infrastructure for gathering, storing, and retrieving knowledge. That began changing in the 1990s when companies started realizing how much knowledge was lying dormant in text documents and reports. The structured knowledge systems were the first attempts at capturing this type of knowledge and making it easily available to a wider range of people inside the organization. 11-8 As people started using newer forms of communications such as e-mails, chat rooms, voice mail, and digital-based reports, graphics, and presentations, organizations had to
  • 98. adapt their systems to accommodate the semistructured knowledge. Enterprise content management systems are designed to piggyback on the more rigidly structured knowledge systems to incorporate a wider range of information. Centralized knowledge repositories include information from the structured and semistructured knowledge systems. The knowledge repository is then easily accessed by employees throughout the organization and can also be properly managed by the CKO. Before you get all the data, information, and knowledge into your enterprise content management system, you need to create a taxonomy that will help organize the information into meaningful categories. That makes it easy to find things later on. For example, you have lots of digital renderings of your company logo. Set up a taxonomy called “Logo.” Now, whenever you add another digital file of a logo, you tag it with the taxonomy.
  • 99. For those firms whose knowledge is contained in objects other than simple documents, digital asset management systems help them collect, store, and process knowledge contained in photographs, graphic images, videos, and audio files. Locating and Sharing Expertise Because it’s simply too expensive and too time-consuming to continually reinvent the wheel, corporations are turning to enterprise content management systems and systems for collaboration and social business in an attempt to link those who hold the knowledge with those that need the knowledge. Employees who have the tacit knowledge about a product or project in their head are easily connected with employees who need to know the information through these kinds of networks. Corporations save time and money by placing data pertaining to the subject matter experts in a directory that all employees can access. Users are easily connected to the experts through these networks and can