GTM Journals

Article

Form of Contribution
Theoretical Sampling
Role of Prior Theory .d
Open Coding
Axial Coding


Selective Coding

Theoretical Coding
Constant Comparison
Memoing
Coding Paradigm
GTM Approach
GTM Adaptions
Core Category
Duration (Months)Citations per Year .c
Total Citations .c
Barrett and Walsham 1999TbS341388222
Maznevski and Chudoba 2000TbaaaaS2197071456
Larsen et al 2009TbS45026
Goulielmos 2004TS41846
Boudreau and Robey 2005TS15629629
Volkoff et al. 2007TaS362838227
Ransbotham and Mitra 2009TS3-4a121773
Strong and Volkoff 2010TS363100155
Abraham et al. 2013TbaaSb204008
Gasson and Waters 2013TG2,55010
Corbett and Mellouli 2017TS12
Gregory et al. 2015TG24
Bensaou et al. 2014TGS16
Shaw 2014TS
Gregory et al. 2013T2G53
Mattarelli et al. 2013TS24
Nidhra et al. 2013TS
Dougherty & Dunne 2012TS36
Zahedi and Bansal 2011TS
Vannoy and Salam 2010TS
Gerlach et al 2018TG
Hansen and Baroody 2019TS
Zamani and Pouloudi 2020T2G74
Miceli et al 2020T2G
Barber and Bettez 2020TS
Wiedemann et al 2020TG
Gerlach and Cenfetelli 2020T2G
Gregory et al. 2018TGS60
Krancher et al. 2018T2G
Smolander et al. 2008MbSa1247133
Huff and Munro 1985MaaaGaa9a643193
Orlikowski 1993MS6901518
Crook and Kumar 1998MS1312223
Scott 2000MS62280342
Scott and Kaindl 2000MS181127169
Lee 2001MS6105147
Fabricatore et al. 2002MaaaaS14a1131147
Levina and Ross 2003MaaaSa40a5383646
Nasirin and Birks 2003MGS2530
Sherif and Vinze 2003MS53364
Smith and Kumar 2004MS1164128
Shah 2006MS660594
Espinosa et al. 2007MS3075246
Xu and Ramesh 2007MS43835
Day et al. 2007MS106764
Palka et al. 2009MS151850111
Chalkraborty et al. 2010MaaSa40a144072
Qiu et al. 2017MGS20
Miranda et al. 2015MG72
Montazemi and Qahri-Saremi 2015M2G
Sadovykh et al. 2015MGS
Hinds & Cramton 2014M2G
Lin et al. 2014MS
Austin et al. 2012M2G
Edberg et al. 2012M2G24
Galliers and Huang 2012MGS3
Lin et al. 2012MGS
Berente et al. 2011MS
Boldosova 2019MS
Senyo et al 2019M2G
Taylor et al 2019M2G3
Carugati et al. 2018MG48
Ghobadi and Mathiassen 2017MGS12
Huang et al. 2017MS8
Liu et al. 2017MS120
Parks et al. 2017M2G18
Seeley and Targett 1997DS11721
De Vreede et al. 1998DS24812138
Seeley and Targett 1999DS36959
Jones and Hughes 2001DS886124
Slack and Rowley 2002DS228537
Debreceny et al. 2003DS30036
Lander et al. 2004DS1409155
Volkoff et al. 2005DaGaa361100110
Zahedi et al. 2006DG40036
Hackney et al. 2007DS51341
Tschang 2007DGS361663133
Kesseler 2008DGS5628620
Ribes and Finholt 2009Da2Ga561783107
Chang et al. 2011DS32513
Lederman and Johnston 2011DS2510
Mueller et al 2018DS9
Feuston et al 2020D2G24
Does apply T Theory
Does apply partially/indicated M Model
Other D Description
Not reported GS Glaser und Strauss (1967)
a Change after contacting the authors based on additional information S Straussian
b Change after contacting the authors based on false coding G Glaserian
c Citations from Google Scholar as of Spring 2015 2G 2nd generation (e.g. Clarke)
d Reverse coding

References:

Abdel-Hamid, T. K. (1989). “A Study of Staff Turnover, Acquisition, and Assimiliation and Their Impact on Software Development Cost and Schedule.” Journal of Management Information Systems 6(1): 21-40.
Abhay Nath, M., A. Catherine and R. Agarwal (2012). “Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective.” Information Systems Research 23(3): 738-760.
Abraham, C., M.-C. Boudreau, I. Junglas and R. Watson (2013). “Enriching our Theoretical Repertoire: The Role of Evolutionary Psychology in Technology Acceptance.” European Journal of Information Systems 22(1): 56-75.
Austin, R. D., L. Devin and E. E. Sullivan (2012). “Accidental Innovation: Supporting Valuable Unpredictability in the Creative Process.” Organization Science 23(5): 1505-1522.
Barber, C. S. and S. C. Bettez (2020). “Exposing patterns of adult solicitor behaviour: towards a theory of control within the cybersexual abuse of youth.” European Journal of Information Systems.
Barrett, M. and G. Walsham (1999). “Electronic Trading and Work Transformation in the London Insurance Market.” Information Systems Research 10(1): 1-22.
Beck, T. E. and D. A. Plowman (2014). “Temporary, Emergent Interorganizational Collaboration in Unexpected Circumstances: A Study of the Columbia Space Shuttle Response Effort.” Organization Science 25(4): 1234-1252.
Bensaou, B. M., C. Galunic and C. Jonczyk-Sédès (2014). “Players and Purists: Networking Strategies and Agency of Service Professionals.” Organization Science 25(1): 29-56.
Bercovitz, J. E. L. and B. B. Tyler (2014). “Who I Am and How I Contract: The Effect of Contractors’ Roles on the Evolution of Contract Structure in University-Industry Research Agreements.” Organization Science 25(6): 1840-1859.
Berente, N., S. Hansen, J. C. Pike and P. J. Bateman (2011). “Arguing the Value of Virtual Worlds: Patterns of Discursive Sensemaking of an Innovative Technology.” MIS Quarterly 35(3): 685-709.
Berente, N., S. Seidel and H. Safadi (2018). “Research Commentary—Data-Driven Computationally Intensive Theory Development.” Information Systems Research.
Berente, N., S. Seidel and H. Safadi (2019). “Research Commentary—Data-Driven Computationally Intensive Theory Development.” Information Systems Research 30(1): 50-64.
Boldosova, V. (2019). “Deliberate storytelling in big data analytics adoption.” Information Systems Journal 29(6): 1126-1152.
Boudreau, M.-C. and D. Robey (2005). “Enacting Integrated Information Technology: A Human Agency Perspective.” Organization Science 16(1): 3-18.
Carugati, A., W. Fernández, L. Mola and C. Rossignoli (2018). “My choice, your problem? Mandating IT use in large organisational networks.” Information Systems Journal 28(1): 6-47.
Chakraborty, S., S. Sarker and S. Sarker (2010). “An Exploration into the Process of Requirements Elicitation: A Grounded Approach.” Journal of the Association for Information Systems 11(4): 212-249.
Chang, C. L.-H., V. Chen, G. Klein and J. J. Jiang (2011). “Information System Personnel Career Anchor Changes Leading to Career Changes.” European Journal of Information Systems 20(1): 103-117.
Corbett, J. and S. Mellouli (2017). “Winning the SDG Battle in Cities: How an Integrated Information Ecosystem Can Contribute to the Achievement of the 2030 Sustainable Development Goals.” Information Systems Journal 27(4): 427-461.
Crook, C. W. and R. L. Kumar (1998). “Electronic Data Interchange: A Multi-Industry Investigation using Grounded Theory.” Information & Management 34(2): 75-89.
Day, J. M., I. Junglas and L. Silva (2009). “Information Flow Impediments in Disaster Relief Supply Chains.” Journal of the Association for Information Systems 10(8): 637-660.
De Vreede, G.-J., N. Jones and R. J. Mgaya (1998). “Exploring the Application and Acceptance of Group Support Systems in Africa.” Journal of Management Information Systems 15(3): 197-234.
Debreceny, R., M. Putterill, L.-L. Tung and A. L. Gilbert (2003). “New Tools for the Determination of e-Commerce Inhibitors.” Decision Support Systems 34(2): 177-195.
Dougherty, D. and D. D. Dunne (2012). “Digital Science and Knowledge Boundaries in Complex Innovation.” Organization Science 23(5): 1467-1484.
Edberg, D., P. Ivanova and W. Kuechler (2012). “Methodology Mashups: An Exploration of Processes Used to Maintain Software.” Journal of Management Information Systems 28(4): 271-304.
Espinosa, J. A., S. A. Slaughter, R. E. Kraut and J. D. Herbsleb (2007). “Team Knowledge and Coordination in Geographically Distributed Software Development.” Journal of Management Information Systems 24(1): 135-169.
Fabricatore, C., M. Nussbaum and R. Rosas (2002). “Playability in Action Videogames: A Qualitative Design Model.” Human-Computer Interaction 17(4): 311-368.
Feuston, J. L., A. S. Taylor and A. M. Piper (2020). “Conformity of Eating Disorders through Content Moderation.” Human-Computer Interaction 4: 1-28.
Galliers, R. D. and J. C. Huang (2012). “The Teaching of Qualitative Research Methods in Information Systems: an Explorative Study Utilizing Learning Theory.” European Journal of Information Systems 21(2): 119-134.
Gasson, S. and J. Waters (2013). “Using a Grounded Theory Approach to Study Online Collaboration Behaviors.” European Journal of Information Systems 22(1): 95-118.
Gerlach, J. P. and R. T. Cenfetelli (2020). “Constant Checking Is Not Addiction: A Grounded Theory of IT-Mediated State-Tracking.” MIS Quarterly 44(4): 1705-1732.
Gerlach, J. P., N. Eling, N. Wessels and P. Buxmann (2018). “Flamingos on a slackline: Companies’ challenges of balancing the competing demands of handling customer information and privacy.” Information Systems Journal 29(2): 548-575.
Ghobadi, S. and L. Mathiassen (2017). “Risks to Effective Knowledge Sharing in Agile Software Teams: A Model for Assessing and Mitigating Risks.” Information Systems Journal 27(6): 699-731.
Ghoshal, A., S. Menon and S. Sarkar (2015). “Recommendations Using Information from Multiple Association Rules: A Probabilistic Approach.” Information Systems Research 26(3): 532-551.
Giessmann, A. and C. Legner (2016). “Designing business models for cloud platforms.” Information Systems Journal 26(5): 551-579.
Goes, P. B. (2013). Editor’s Comments. MIS Quarterly, MIS Quarterly. 37: iii-vii.
Goulielmos, M. (2004). “Systems Development Approach: Transcending Methodology.” Information Systems Journal 14(4): 363-386.
Gregory, R. W., R. Beck and M. Keil (2013). “Control Balancing in Information Systems Development Offshoring Projects.” MIS Quarterly 37(4): 1211-A1214.
Gregory, R. W., E. Kaganer, O. Henfridsson and T. J. Ruch (2018). “IT CONSUMERIZATION AND THE TRANSFORMATION OF IT GOVERNANCE.” MIS Quarterly 42(4): 1225-1253.
Gregory, R. W., M. Keil, J. Muntermann and M. Mähring (2015). “Paradoxes and the Nature of Ambidexterity in IT Transformation Programs.” Information Systems Research 26(1): 57-80.
Hackney, R., S. Jones and A. Lösch (2007). “Towards an e-Government Efficiency Agenda: The Impact of Information and Communication Behaviour on e-Reverse Auctions in Public Sector Procurement.” European Journal of Information Systems 16(2): 178-191.
Hansen, S. and A. J. Baroody (2019). “Electronic Health Records and the Logics of Care: Complementarity and Conflict in the U.S. Healthcare System.” Information Systems Research 31(1): 1-19.
Hinds, P. J. and C. D. Cramton (2014). “Situated Coworker Familiarity: How Site Visits Transform Relationships Among Distributed Workers.” Organization Science 25(3): 794-814.
Huang, J., O. Henfridsson, M. J. Liu and S. Newell (2017). “GROWING ON STEROIDS: RAPIDLY SCALING THE USER BASE OF DIGITAL VENTURES THROUGH DIGITAL INNOVATON.” MIS Quarterly 41(1): 301-314.
Huff, S. L. and M. C. Munro (1985). “Information Technology Assessment and Adoption: A Field Study.” MIS Quarterly 9(4): 327-340.
Johnston, A. C., M. Warkentin and M. Siponen (2015). “AN ENHANCED FEAR APPEAL RHETORICAL FRAMEWORK: LEVERAGING THREATS TO THE HUMAN ASSET THROUGH SANCTIONING RHETORIC.” MIS Quarterly 39(1): 113-A117.
Jones, S. and J. Hughes (2001). “Understanding IS Evaluation as a Complex Social Process: A Case Study of a UK Local Authority.” European Journal of Information Systems 10(4): 189-203.
Kesseler, E. (2008). “Assessing COTS Software in a Certifiable Safety‐Critical Domain.” Information Systems Journal 18(3): 299-324.
Krancher, O., P. Luther and M. Jost (2018). “Key Affordances of Platform-as-a-Service: Self-Organization and Continuous Feedback.” Journal of Management Information Systems 35(3): 776-812.
Lander, M. C., R. L. Purvis, G. E. McCray and W. Leigh (2004). “Trust-Building Mechanisms Utilized in Outsourced IS Development Projects: A Case Study.” Information & Management 41(4): 509-528.
Larsen, T. J., F. Niederman, M. Limayem and J. Chan (2009). “The Role of Modelling in Achieving Information Systems Success: UML to the Rescue?” Information Systems Journal 19(1): 83-117.
Lederman, R. and R. B. Johnston (2011). “Decision Support or Support for Situated Choice: Lessons for System Design from Effective Manual Systems.” European Journal of Information Systems 20(5): 510-528.
Lee, C. S. (2001). “Modeling the Business Value of Information Technology.” Information & Management 39(3): 191-210.
Levina, N. and J. W. Ross (2003). “From the Vendor’s Perspective: Exploring the Value Proposition in Information Technology Outsourcing.” MIS Quarterly 27(3): 331-364.
Lin, A. C. H., W. D. Fernandez and S. Gregor (2012). “Understanding Web Enjoyment Experiences and Informal Learning: A Study in a Museum Context.” Decision Support Systems 53(4): 846-858.
Lin, H.-C. K., T.-Y. Chuang, I. L. Lin and H.-Y. Chen (2014). “Elucidating the Role of IT/IS Assessment and Resource Allocation in IT/IS Performance in Hospitals.” Information & Management 51(1): 104-112.
Liu, C. C., S. B. Srivastava and T. E. Stuart (2016). “An Intraorganizational Ecology of Individual Attainment.” Organization Science 27(1): 90-105.
Liu, M., C. E. Hull and Y. T. C. Hung (2017). “Starting open source collaborative innovation: the antecedents of network formation in community source.” Information Systems Journal 27(5): 643-670.
Mattarelli, E., F. Bertolotti and D. M. Macrì (2013). “The Use of Ethnography and Grounded Theory in the Development of a Management Information System.” European Journal of Information Systems 22(1): 26-44.
Maznevski, M. L. and K. M. Chudoba (2000). “Bridging Space over Time: Global Virtual Team Dynamics and Effectiveness.” Organization Science 11(5): 473-492.
Miceli, M., M. Schuessler and T. Yang (2020). “Between Subjectivity and Imposition: Power Dynamics in Data Annotation for Computer Vision.” Human-Computer Interaction 1(1): 1-25.
Miller, C. C., N. T. Washburn and W. H. Glick (2013). “The Myth of Firm Performance.” Organization Science 24(3): 948-964.
Miranda, S. M., I. Kim and J. D. Summers (2015). “Jamming with Social Media: How Cognitive Structuring of Organizing Vision Facets Affects IT Innovation Diffusion.” MIS Quarterly 39(3): 591-A519.
Montazemi, A. R. and H. Qahri-Saremi (2015). “Factors Affecting Adoption of Online Banking: A Meta-analytic Structural Equation Modeling Study.” Information & Management 52(2): 210-226.
Mueller, K. S., J. Mendling and E. W. N. Bernroider (2018). “The roles of social identity and dynamic salient group formations for ERP program management success in a postmerger context.” Information Systems Journal 29(3): 609-640.
Nasirin, S. and D. F. Birks (2003). “DSS Implementation in the UK Retail Organisations: A GIS Perspective.” Information & Management 40(4): 325-336.
Nidhra, S., M. Yanamadala, W. Afzal and R. Torkar (2013). “Knowledge Transfer Challenges and Mitigation Strategies in Global Software Development—A Systematic Literature Review and Industrial Validation.” International Journal of Information Management 33(2): 333-355.
Orlikowski, W. J. (1993). “CASE Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development.” MIS Quarterly 17(3): 309-340.
Palka, W., K. Pousttchi and D. G. Wiedemann (2009). “Mobile Word-of-Mouth: A Grounded Theory of Mobile Viral Marketing.” Journal of Information Technology 24(2): 172-185.
Parks, R., H. Xu, C.-H. Chu and P. B. Lowry (2017). “Examining the intended and unintended consequences of organisational privacy safeguards.” European Journal of Information Systems 26(1): 37-65.
Qiu, Y., A. Gopal and I.-H. Hann (2017). “Logic Pluralism in Mobile Platform Ecosystems: A Study of Indie App Developers on the iOS App Store.” Information Systems Research 28(2): 225-249.
Ransbotham, S. and S. Mitra (2009). “Choice and Chance: A Conceptual Model of Paths to Information Security Compromise.” Information Systems Research 20(1): 121-139.
Ribes, D. and T. A. Finholt (2009). “The Long Now of Technology Infrastructure: Articulating Tensions in Development.” Journal of the Association for Information Systems 10(5): 375-398.
Sadovykh, V., D. Sundaram and S. Piramuthu (2015). “Do Decision-making Structure and Sequence Exist in Health Online Social Networks?” Decision Support Systems 74: 102-120.
Scott, J. E. (2000). “Facilitating Interorganizational Learning with Information Technology.” Journal of Management Information Systems 17(2): 81-113.
Scott, J. E. and L. Kaindl (2000). “Enhancing Functionality in an Enterprise Software Package.” Information & Management 37(3): 111-122.
Seeley, M. and D. Targett (1999). “Patterns of Senior Executives’ Personal Use of Computers.” Information & Management 35(6): 315-330.
Seeley, M. E. and D. Targett (1997). “A Senior Executive End‐User Framework.” Information Systems Journal 7(4): 289-308.
Senyo, P. K., K. Liu and J. Effah (2019). “Digital business ecosystem: Literature review and a framework for future research.” International Journal of Information Management 47: 52-64.
Shah, S. K. (2006). “Motivation, Governance, and the Viability of Hybrid Forms in Open Source Software Development.” Management Science 52(7): 1000-1014.
Shaw, N. (2014). “The Role of the Professional Association: A Grounded Theory Study of Electronic Medical Records usage in Ontario, Canada.” International Journal of Information Management 34(2): 200-209.
Sherif, K. and A. Vinze (2003). “Barriers to Adoption of Software Reuse: A Qualitative Study.” Information & Management 41(2): 159-175.
Singh, P. V., T. Yong and N. Youn (2011). “A Hidden Markov Model of Developer Learning Dynamics in Open Source Software Projects.” Information Systems Research 22(4): 790-807.
Slack, F. and J. Rowley (2002). “Kiosks 21: A New Role for Information Kiosks?” International Journal of Information Management 22(1): 67-83.
Smith, M. A. and R. L. Kumar (2004). “A Theory of Application Service Provider (ASP) Use from a Client Perspective.” Information & Management 41(8): 977-1002.
Smolander, K., M. Rossi and S. Purao (2008). “Software Architectures: Blueprint, Literature, Language or Decision?” European Journal of Information Systems 17(6): 575-588.
Stanko, M. A. (2016). “Toward a Theory of Remixing in Online Innovation Communities.” Information Systems Research 27(4): 773-791.
Strong, D. M. and O. Volkoff (2010). “Understanding Organization-Enterprise System Fit: A Path to Theorizing the Information Technology Artifact.” MIS Quarterly 34(4): 731-756.
Taylor, A., H. R. Lee, A. Kubota and L. D. Riek (2019). “Coordinating Clinical Teams: Using Robots to Empower Nurses to Stop the Line.” Human-Computer Interaction 3: 1-30.
Tschang, F. T. (2007). “Balancing the Tensions between Rationalization and Creativity in the Video Games Industry.” Organization Science 18(6): 989-1005.
Vannoy, S. A. and A. F. Salam (2010). “Managerial Interpretations of the Role of Information Systems in Competitive Actions and Firm Performance: A Grounded Theory Investigation.” Information Systems Research 21(3): 496-515.
Vardaman, J. M., S. G. Taylor, D. G. Allen, M. B. Gondo and J. M. Amis (2015). “Translating Intentions to Behavior: The Interaction of Network Structure and Behavioral Intentions in Understanding Employee Turnover.” Organization Science 26(4): 1177-1191.
Vitorino, M. A. (2014). “Understanding the Effect of Advertising on Stock Returns and Firm Value: Theory and Evidence from a Structural Model.” Management Science 60(1): 227-245.
Volkoff, O., D. M. Strong and M. B. Elmes (2005). “Understanding Enterprise Systems-enabled Integration.” European Journal of Information Systems 14(2): 110-120.
Volkoff, O., D. M. Strong and M. B. Elmes (2007). “Technological Embeddedness and Organizational Change.” Organization Science 18(5): 832-848.
Whelan, E., R. Teigland, E. Vaast and B. Butler (2013). “Editorial.” Information Systems Journal 23(6): 471-474.
Wiedemann, A., M. Wiesche, H. Gewald and H. Krcmar (2020). “Understanding How DevOps Aligns Development and Operations: A Tripartite Model of Intra-IT Alignment.” European Journal of Information Systems 29(5): 458-473.
Wollersheim, J. and K. H. Heimeriks (2016). “Dynamic Capabilities and Their Characteristic Qualities: Insights from a Lab Experiment.” Organization Science 27(2): 233-248.
Xu, P. and B. Ramesh (2007). “Software Process Tailoring: an Empirical Investigation.” Journal of Management Information Systems 24(2): 293-328.
Yaraghi, N., A. Ye Du, R. Sharman, R. D. Gopal and R. Ramesh (2015). “Health Information Exchange as a Multisided Platform: Adoption, Usage, and Practice Involvement in Service Co-Production.” Information Systems Research 26(1): 1-18.
Zahedi, F., W. V. Van Pelt and M. Srite (2006). “Web Documents’ Cultural Masculinity and Femininity.” Journal of Management Information Systems 23(1): 87-128.
Zahedi, F. M. and B. Gaurav (2011). “Cultural Signifers of Web Site Images.” Journal of Management Information Systems 28(1): 147-200.
Zamani, E. D. and N. Pouloudi (2020). “Generative mechanisms of workarounds, discontinuance and reframing: a study of negative disconfirmation with consumerised IT.” Information Systems Journal.
Zheng, Z., P. A. Pavlou and G. Bin (2014). “Latent Growth Modeling for Information Systems: Theoretical Extensions and Practical Applications.” Information Systems Research 25(3): 547-568.