Your contribution can guide someone’s learning journey. Share your
documents today.
ICT615 Information Technology Research Methods Topic 2 Conducting a literature review This session will introduce you to literature reviews. We will look at what they are, why they are needed and how they should be written. You will also have a session with the IT librarian to gain practical experience using the available resources to identify and obtain literature needed for a literature review. Reading Required: ●Oates, B. J. (2006) Researching Information Systems and Computing.Chapter 6. Other readings: Randolph, J. J. (2009) A guide to writing the dissertation literature review. Practical Assessment, Research and Evaluation 14(13). Available fromhttp://pareonline.net/pdf/v14n13.pdf Taylor, D. The Literature Review: A Few Tips on Conducting It* * Available from theLibrary’s electronic reserve section Aims After completing this topic you should be able to: ●Understand the main reasons why researchers conduct literature reviews ●Describe the objectives of a literature review ●Use Murdoch University library electronic resources to identify and obtain relevant literature resources ●Cite references and create reference lists using common referencing styles ●Acquire EndNote bibliographic software and use it to store and manage your references (http://libguides.murdoch.edu.au/Endnote) TutorialTasks 1.Create an outline of the structure of the literature review component of the following paper (available through the library catalogue or from Google Scholar). The outline should start with the formal structure (i.e. headings and any sub-headings) and you should represent the structure the authors have used within this formal structure with a list of the main points being made. 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
oBulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security awareness, information security management, compliance, information security policy, behavioral issues of information security, theory of planned behavior. MIS Quarterly, 34(3), 523-548. 2.Go through the article posted on LMS: IT CONSUMERIZATION: BYOD- PROGRAM ACCEPTANCE AND ITS IMPACT ON EMPLOYER ATTRACTIVENESS. Answer the following questions: a)Does the paper review any previous literature? b)What sorts of literature does it draw upon (e.g. books, journal articles, conference papers, web sites)? Are the sources of a suitable type for use in academic research? c)Does the literature review appear mainly in one section, or is it spread throughout the paper? d)Do you think the literature review is well structured? Does it provide the necessary background and justification for the project described in the paper. 3.Investigate the following styles of referencing: APA and IEEE. The following might be useful (not assessed): http://library.murdoch.edu.au/Getting-help/Referencing/ Then pick at least one book, one journal article and one internet document from the reference list for the article used in tasks above and present it in both formats. 4.Use DATABASE in the Library website or Google Scholar (http://scholar.google.com.au) to search articles on research topic of your choice (no need to write anything, but make sure you are familiar with the search engine; it will make you finish the assignment 1&2 easier) (not assessed) Sample questions 1.Provide3reasons why researchers do literature reviews. 2