The purpose of this paper is to discuss the critical realism (CR) philosophical viewpoint and how it can be applied in qualitative research. CR is a relatively new and viable…
Abstract
Purpose
The purpose of this paper is to discuss the critical realism (CR) philosophical viewpoint and how it can be applied in qualitative research. CR is a relatively new and viable philosophical paradigm proposed as an alternative to the more predominant paradigms of positivism, interpretivism and pragmatism. This paper reviews the concept, its benefits and limitation. It goes further to provide an example of how CR is used as a philosophical and methodological framework with the systems thinking theory to applied qualitative research.
Design/methodology/approach
A study of project management challenges in a Nigerian government organisation is used to demonstrate a qualitative research approach, which includes a coding process and data analysis that is consistent with CR ontology and epistemology.
Findings
CR focuses primarily on closed systems. However, a more accurate explanation of reality is obtained in addition to the identification of contextual causal mechanisms in the context of study when a general systems theory is applied.
Research limitations/implications
The knowledge about the nature of relationships obtained in the context of study may not necessarily be replicated in another context. However, this paper elucidates a CR process that is generalisable by demonstrating how a theory is applied in a different context.
Originality/value
The paper demonstrates how systems theory is used to understand interactions in a CR paradigm. It engages with CR approach critically and illustrates a clear example of how CR can be applied in social research.
Details
Keywords
John Smith, Wilfred Ashworth, David F Radmore, Anthony Olden, Morris Garratt, Peter Labdon, WJ Murison, David Cawthorne and Don Revill
‘To MEET the threat, and to realize the potential, we do not need a doctrine of salvation. We have the weapons we need, our minds. Reasoned analysis, imaginative designing and an…
Abstract
‘To MEET the threat, and to realize the potential, we do not need a doctrine of salvation. We have the weapons we need, our minds. Reasoned analysis, imaginative designing and an experimental approach to action form a rational, or at any rate reasonable, triptych which has always served men well. This is the method of liberty; its substance is defined by the new conditions in which we live today. The new liberty means that we have to change our attitudes in order to pass through the turbulence ahead in a manner which enhances human life‐chances. This is what I mean when I say that the subject of history is changing; and the change in approach is reflected in the words which we use—new words; improvement instead of expansion, good husbandry instead of affluence, human activity instead of work, and of course one word which is quite old, liberty.’—Ralf Dahrendorf (‘The new liberty’, 1975 Reith Lectures)
Patrick O’Brien, Scott W.H. Young, Kenning Arlitsch and Karl Benedict
The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the…
Abstract
Purpose
The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the privacy implications of free services that introduce web tracking of users.
Design/methodology/approach
The home pages of 279 academic libraries were analyzed for the presence of HTTPS, Google Analytics services and privacy-protection features.
Findings
Results indicate that HTTPS implementation on library websites is not widespread, and many libraries continue to offer non-secured connections without an automatically enforced redirect to a secure connection. Furthermore, a large majority of library websites included in the study have implemented Google Analytics and/or Google Tag Manager, yet only very few connect securely to Google via HTTPS or have implemented Google Analytics IP anonymization.
Practical implications
Librarians are encouraged to increase awareness of this issue and take concerted and coherent action across five interrelated areas: implementing secure web protocols (HTTPS), user education, privacy policies, informed consent and risk/benefit analyses.
Originality/value
Third-party tracking of users is prevalent across the web, and yet few studies demonstrate its extent and consequences for academic library websites.