Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Canonical action research
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Improving ethical usage of corporate data in higher education: Enhanced Enterprise Data Ethics Framework
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2024) 37 (6): 2247–2278.
Published: 29 August 2023
... framework allowed the authors build to build a framework to guide ethical data practice. Design/methodology/approach Adopting a revised canonical action research approach focused on intervention on the context, the authors conducted a review of the literature on ethical usage of data in higher education...
Journal Articles
Journal:
Information Technology & People
Information Technology & People (2018) 31 (1): 239–255.
Published: 05 February 2018
...-implementation phase. Design/methodology/approach A four-year canonical action research project was conducted within a network of more than 300 agricultural cooperatives. Research was carried out both during the IT implementation and after deployment. Key information was gathered through unstructured...
