Course syllabus

Informatics, Qualitative Methods in Information Systems Research, Second Cycle, 7.5 credits

Course code: IK409A Credits: 7.5
Main field of study: Informatics Progression: A1F
    Last revised: 12/03/2019
Education cycle: Second cycle Approved by: Head of school
Established: 21/11/2018 Reading list approved: 12/03/2019
Valid from: Autumn semester 2019 Revision: 1

Aims and objectives

General aims for second cycle education

Second-cycle courses and study programmes shall involve the acquisition of specialist knowledge, competence and skills in relation to first-cycle courses and study programmes, and in addition to the requirements for first-cycle courses and study programmes shall

  • further develop the ability of students to integrate and make autonomous use of their knowledge
  • develop the students' ability to deal with complex phenomena, issues and situations, and
  • develop the students' potential for professional activities that demand considerable autonomy, or for research and development work.

(Higher Education Act, Chapter 1, Section 9)

Course objectives

1. Have the ability to provide an overview of qualitative research strategies, based on current practices in the field of information systems.
2. Have the ability to develop a qualitative research design, including data collection and data analysis, based on one of the research strategies presented in the course.
3. Have the ability to critically reflect on a research design, including data collection and data analysis, based on one of the research strategies presented in the course.
4. Have the ability to discuss ethical aspects of conducting qualitative information systems research.

Main content of the course

The course contains the following modules:
1. Overview of the qualitative research strategies (e.g. case study, design science) in information systems research. During this module the students investigate major research strategies used in information systems. This is done to create an overview of the strategies most significant characteristics, steps, and what kind of limitations these strategies have. (Addresses goal 1).
2. Data collection techniques. During this module the students investigate different data collection techniques, such as interviews, focus groups, observations, retrieval of documents. The purpose is to develop an ability to select and tailor data collection techniques based on a research problem and a selected research strategy. (Addresses goal 2)
3. Data analysis. This module focuses on techniques to analyse collected data in order to draw conclusions. For example, how a theoretical framework can be used to drive the analysis. The purpose is to develop an ability to select and tailor data analysis techniques based on a research problem and a selected research strategy. (Addresses goal 3)
4. Ethics in information systems research. During this module the students discuss ethical aspects of information systems research, in order to identify research practices that a problematic from an ethical point of view. Furthermore, this module addresses good research conduct and researchers' integrity. (Addresses goal 4).

Teaching methods

The employed teaching methods are anchored in flipped classroom and case-based learning. The flipped classroom means focusing on exploring topics in greater depth and creating meaningful learning opportunities in class time, while content delivery is made outside of the classroom. Case-based learning means that scenarios from real-world examples are used to as a point of departure for in class activities and assignments.

In this course these teaching methods are implemented through online lectures, individual readings, in-class activities based on given research problems, and group assignments based on given research problems.

Students who have been admitted to and registered on a course have the right to receive tuition and/or supervision for the duration of the time period specified for the particular course to which they were accepted (see, the university's admission regulations (in Swedish)). After that, the right to receive tuition and/or supervision expires.

Examination methods

Overview of Research Strategies, 1.5 credits (Code: A001)
Group oral presentation on major research strategies used in the field of information systems. The student has to give an account for the characteristics of the research strategies, the major steps included, and when the strategy is suitable to use (Assesses goal 1)

Design of Research Strategy, 3 credits (Code: A002)
Group assignment in two parts: a) written assignment to design a research strategy for a given research question, b) oral presentation of the designed research strategy. (Assesses goal 2 and 4)

Review of Research Design, 3 credits (Code: A003)
An individual written report where the student review and critically reflect on another group's research design (Assesses goal 3 and 4)


For students with a documented disability, the university may approve applications for adapted or other forms of examinations.

For further information, see the university's local examination regulations (in Swedish).

Grades

According to the Higher Education Ordinance, Chapter 6, Section 18, a grade is to be awarded on the completion of a course, unless otherwise prescribed by the university. The university may prescribe which grading system shall apply. The grade is to be determined by a teacher specifically appointed by the university (an examiner).

According to regulations on grading systems for first- and second-cycle education (vice-chancellor's decision 2019-01-15, ORU 2019/00107), one of the following grades is to be used: fail, pass, or pass with distinction. The vice-chancellor or a person appointed by the vice-chancellor may decide on exceptions from this provision for a specific course, if there are special reasons.

Grades used on course are Fail (U), Pass (G) or Pass with Distinction (VG).

Overview of Research Strategies
Grades used are Fail (U) or Pass (G).

Design of Research Strategy
Grades used are Fail (U) or Pass (G).

Review of Research Design
Grades used are Fail (U), Pass (G) or Pass with Distinction (VG).

For further information, see the university's local examination regulations (in Swedish).

Comments on grades

In order to receive the grade Pass, the student must be awarded Pass in all examination parts. In order to receive the grade Pass with Distinction, the student must be awarded Pass with Distinction in Review of Research Design and grade Pass in all other examination parts.

The final grade will be translated into the ECTS grading scale.

Specific entry requirements

Informatics, Basic Course 30 Credits, 30 Credits at intermediate course level within Informatics and successful completion of at least 15 Credits at advanced course level within Informatics. Alternatively Business Administration, Basic Course, 30 Credits, Business Administration, Intermediate Course, 30 Credits and successful completion of at least 15 Credits at advanced course level within Business Administration. Alternatively 30 Credits within G1N in Computer Science and 45 Credits within G1F in Computer Science.

In addition, the student need to have at least 15 Credits of courses in information security that corresponds to successful completion of at least 15 Credits in the first semester of the Master's Programme in Information Systems - Information Security Management i.e. successful completion of at least 15 Credits of courses: Informatics, Introduction to Information Security, Second, second cycle, 7.5 credits (A1N), Informatics, Regulatory Aspects of Information Security, second cycle, 7.5 credits (A1N), Informatics, Social Aspects of Information Security, second cycle, 7.5 credits (A1N), Informatics, Introduction to IT Security, second cycle, 7.5 credits (A1N). The applicant must also have qualifications corresponding to the course "English 6" or "English B" from the Swedish Upper Secondary School.

For further information, see the university's admission regulations (in Swedish).

Transfer of credits for previous studies

Students who have previously completed higher education or other activities are, in accordance with the Higher Education Ordinance, entitled to have these credited towards the current programme, providing that the previous studies or activities meet certain criteria.

For further information, see the university's local credit transfer regulations (in Swedish).

Other provisions

Remaining tasks should be completed as soon as possible according to the teacher's instructions.

Reading list and other teaching materials

Required Reading

Myers, Michael David & David E. Avison (2002)
Qualitative Research in Information Systems: A Reader
Sage, 312 pages

Oates, Briony J. (2006)
Researching Information Systems and Computing
SAGE, ISBN/ISSN: 978-14129-02-24-3, 360 pages

Recker, Jan (2012)
Scientific Research in Information Systems: A Beginner's Guide
Springer Science & Business Media, 164 pages

Silverman, David (2015)
Interpreting Qualitative Data
Sage, 520 pages

Vetenskapsrådet (2011)
Good research practice
Vetenskapsrådets rapportserie 3:2011 [Report]

Additional Reading

Karlsson, Fredrik, Åström, Joakim & Martin Karlsson (2015)
Information security culture - State-of-the-art review between 2000 and 2013
40 sidor, Information & Computer Security (23:3), pp. 246-285 [Article in periodical]

Myers, Michael David (1997)
Qualitative Research in Information Systems
2 sidor, MIS Quarterly (21:2), pp. 241-242 [Article in periodical]

Webster, Jane & Richard T. Watson (2002)
Analyzing the past to prepare for the future: Writing a literature review
MIS Quarterly 26 (2), 11 pages, [Article in periodical]