Til hovedinnhold
Norsk English

Case studies synthesis: a thematic, cross-case, and narrative synthesis worked example

Sammendrag

Case studies are largely used for investigating software engineering practices. They are characterized by their flexible nature, multiple forms of data collection, and are mostly informed by qualitative data. Synthesis of case studies is necessary to build a body of knowledge from individual cases. There are many methods for such synthesis, but they are yet not well explored in software engineering. The objective of this research is to demonstrate the similarities and differences of the results and conclusions when applying three different methods of synthesis, and to discuss the challenges of synthesizing evidence from reported case studies in SE. We describe a worked example of three such methods where three independent teams synthesized two studies that investigated critical factors of trust in outsourced projects through thematic synthesis and cross-case analysis, and compared these to each other and also to an already published narrative synthesis. In addition, despite that the primary studies were well presented for synthesis, we identified challenges in the use of case studies synthesis methods related to the goals and research questions of the synthesis, the types and number of case studies, variations in context, limited access to raw data, and quality of the case studies. Thus, we recommend that the analysts should be aware of these challenges and try to account for them during the execution of the synthesis. We also recommend that analysts consider using more than one method of synthesis for sake of reliability of the results and conclusions.
Les publikasjonen

Kategori

Vitenskapelig artikkel

Oppdragsgiver

  • Research Council of Norway (RCN) / 231679/F20
  • Research Council of Norway (RCN) / 231679

Språk

Engelsk

Forfatter(e)

  • Daniela Soares Cruzes
  • Tore Dybå
  • Per Runeson
  • Martin Höst

Institusjon(er)

  • SINTEF Digital / Software Engineering, Safety and Security
  • Lunds universitet

År

2014

Publisert i

Empirical Software Engineering

ISSN

1382-3256

Forlag

Springer

Årgang

20

Hefte nr.

6

Side(r)

1634 - 1665

Vis denne publikasjonen hos Cristin