Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-dzt6s Total loading time: 0 Render date: 2024-12-26T16:44:20.770Z Has data issue: false hasContentIssue false

Chapter 16 - The Rich Facets of Digital Trace Data

from Part III - Illustrative Examples and Emergent Issues

Published online by Cambridge University Press:  08 June 2023

Boyka Simeonova
Affiliation:
University of Leicester
Robert D. Galliers
Affiliation:
Bentley University, Massachusetts and Warwick Business School
Get access

Summary

Increasing digitalization means that many of our daily interactions happen within digital environments where they leave digital footprints in the form of trace data. Such digital trace data is often thought to generate insights by virtue of its immense scale. This focus on ‘big data’ tends to overlook the richness and complex characteristics of digital traces that opens new vistas for a multitude of computational analyses that generate new and high-resolution insights to digital environments. As such, paying attention to the characteristics of trace data allows for deep investigations of social-technical interactions in unprecedented detail.

This chapter describes the process of digital trace analysis through four analytical activities aimed at identifying units of analysis, extracting categories, validating patterns and conceptualizing findings from digital trace data. It then shows how analytical activities can be applied to a given digital trace dataset to derive three ‘facets’ that each provide rich conceptualizations of social interaction with technology. It explains each facet and outlines ways to implement digital trace analyses that focus on facets relating to relations (network analysis), processes (sequence analysis) or semantics (text analysis).

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abbott, A. (1995). Sequence analysis: New methods for old ideas. Annual Review of Sociology, 21(1), 93113.Google Scholar
Abbott, A. (1990). A primer on sequence methods. Organization Science, 1(4), 375392.Google Scholar
Abbott, A. and Hrycak, A. (1990). Measuring resemblance in sequence data: An optimal matching analysis of musicians’ careers. American Journal of Sociology, 96(1), 144185.Google Scholar
Alvarez, R. M. (2016). Computational Social Science: Discovery and Prediction. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
Andersen, J. V. and Ingram Bogusz, C. (2019). Self-organizing in blockchain infrastructures: Generativity through shifting objectives and forking. Journal of the Association of Information Systems, 20(9), 247265.Google Scholar
Baldwin, C., MacCormack, A. and Rusnak, J. (2014). Hidden structure: Using network methods to map system architecture. Research Policy, 43(8), 13811397.Google Scholar
Bastian, M., Heymann, S. and Jacomy, M. (2009). Gephi: An open-source software for exploring and manipulating networks. Proceedings of the Third International Conference on Weblogs and Social Media, San Jose, CA.Google Scholar
Biemann, T. and Datta, D. K. (2014). Analyzing sequence data: Optimal matching in management research. Organizational Research Methods, 17(1), 5176.Google Scholar
Blei, D. M. (2012). Probabilistic topic models. Communications of the ACM, 55(4), 7784.Google Scholar
Blei, D. M., Ng, A. Y. and Jordan, M. I. (2003). Latent dirichlet allocation. Journal of Machine Learning Research, 3(1), 9931022.Google Scholar
Borgatti, S. P., Mehra, A., Brass, D. J. and Labianca, G. (2009). Network analysis in the social sciences. Science, 323(5916), 892895.Google Scholar
Chang, K., Yih, W. and Meek, C. (2013). Multi-relational latent semantic analysis. Conference on Empirical Methods in Natural Language Processing, Seattle, WA.Google Scholar
Choi, K. S., Im, I. and Yoo, Y. (2013). Liquid communication: An analysis of the impact of mobile micro-blogging on communication and decision-making. International Conference on Information Systems, Milan, Italy.Google Scholar
Cioffi-Revilla, C. (2014). Introduction to Computational Social Science: Principles and Applications. London: Springer.Google Scholar
Cioffi-Revilla, C. (2010). Computational social science. Wiley Interdisciplinary Reviews: Computational Statistics, 2(3), 259271.CrossRefGoogle Scholar
Cloutier, C. and Langley, A. (2020). What makes a process theoretical contribution? Organization Theory, 1(1), Article 2631787720902473.CrossRefGoogle Scholar
Cornwell, B. (2015a). Network methods for sequence analysis. In Social Sequence Analysis: Methods and Applications. New York, NY: Cambridge University Press, pp. 155251.CrossRefGoogle Scholar
Cornwell, B. (2015b). Theoretical foundations of social sequence analysis. In Social Sequence Analysis: Methods and Applications. New York, NY: Cambridge University Press, pp. 2156.Google Scholar
Csardi, G. and Nepusz, T. (2006). The igraph software package for complex network research. InterJournal, Complex Systems, 1965(5), 19.Google Scholar
Debortoli, S., Müller, O., Junglas, I. and vom Brocke, J. (2016). Text mining for information systems researchers: An annotated topic modeling tutorial. Communications of the Association for Information Systems, 39(1), 110135.Google Scholar
Deerwester, S., Dumais, S. T. and Landauer, T. K. (1990). Indexing by latent semantic analysis. Journal of the American Society for Information Science, 41(6), 391-407.Google Scholar
Faulkner, P. and Runde, J. (2019). Theorizing the digital object. MIS Quarterly, 43(4), 12791302.Google Scholar
Gabadinho, A., Ritschard, G. and Studer, M. (2011). Analyzing and visualizing state sequences in R with TraMineR. Journal of Statistical Software, 40(4), 137.Google Scholar
Gaskin, J., Berente, N., Lyytinen, K. and Yoo, Y. (2014). Toward generalizable sociomaterial inquiry: A computational approach for zooming in and out of sociomaterial routines. MIS Quarterly, 38(3), 849871.Google Scholar
Gaskin, J., Schutz, D., Thummadi, V., Weiss, A., Berente, N., Lyytinen, K. and Yoo, Y. (2010). Design DNA: A methodological artifact for sequencing of socio-technical design patterns. International Conference on Information Systems, St Louis, MO.Google Scholar
Glaser, B. G. (1978). Theoretical Sensitivity: Advances in the Methodology of Grounded Theory. Mill Valley, CA: Sociology Press.Google Scholar
Glaser, B. G. and Strauss, A. (1967). The Discovery of Grounded Theory. Chicago, IL: Aldine Publishing.Google Scholar
Godoe, H. (2000). Innovation regimes, R&D and radical innovations in telecommunications. Research Policy, 29(9), 10331046.Google Scholar
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 13601380.Google Scholar
Hedman, J., Srinivasan, N. and Lindgren, R. (2013). Digital traces or information systems: Sociomateriality made researchable. International Conference on Information Systems: Reshaping Society through Information Systems Design, Milan, Italy.Google Scholar
Heise, D. R. (1991). Event structure analysis: A qualitative model of quantitative research. In Fielding, N. and Lee, R. (eds), Using Computers in Qualitative Research. Newbury Park, CA: Sage, pp. 122.Google Scholar
Heise, D. R. (1989). Modeling event structures. Journal of Mathematical Sociology, 14(2–3), 139169.CrossRefGoogle Scholar
Howison, J., Wiggins, A. and Crowston, K. (2011). Validity issues in the use of social network analysis with digital trace data. Journal of the Association for Information Systems, 12(12), 767797.Google Scholar
Johnson, S. L., Safadi, H. and Faraj, S. (2015). The emergence of online community leadership. Information Systems Research, 26(1), 165187.Google Scholar
Jockers, M. L. (2013). Macroanalysis: Digital Methods and Literary History. Urbana and Champaign, IL: University of Illinois Press.CrossRefGoogle Scholar
Kallinikos, J., Aaltonen, A. and Marton, A. (2013). The ambivalent ontology of digital artifacts. MIS Quarterly, 37(2), 357370.Google Scholar
Kitchin, R. (2014). The reframing of science, social science and humanities research. In The Data Revolution: Big Data, Open Data, Data Infrastructures & Their Consequences. London: Sage, pp. 128149.Google Scholar
Knoke, D. and Yang, S. (2008). Social Network Analysis: Mapping and Exploring the Network Society. London: Sage.CrossRefGoogle Scholar
Landauer, T. K., Foltz, P. W. P. and Laham, D. (1998). An introduction to latent semantic analysis. Discourse Processes, 25(2–3), 259284.Google Scholar
Landauer, T. K., McNamara, D. S., Dennis, S. and Kintsch, W. (eds) (2013). Handbook of Latent Semantic Analysis. London and New York, NY: Psychology Press.Google Scholar
Langley, A. (2007). Process thinking in strategic organization. Strategic Organization, 5(3), 271282.Google Scholar
Lazer, D., Pentland, A., Adamic, L., Aral, S., Barabási, A., Brewer, D. et al. (2009). Computational social science. Science, 323(5915), 721723.Google Scholar
Lazer, D. and Radford, J. (2017). Data ex machina: Introduction to big data. Annual Review of Sociology, 43(1), 121.Google Scholar
Lindberg, A. (2020). Developing theory through integrating human & machine pattern recognition. Journal of the Association for Information Systems, 21(1), 90116.Google Scholar
Lindberg, A., Berente, N., Gaskin, J. and Lyytinen, K. (2016). Coordinating interdependencies in online communities: A study of an open source software project. Information Systems Research, 27(4), 751772.Google Scholar
Lindberg, A., Gaskin, J., Berente, N., Lyytinen, K. and Yoo, Y. (2013). Computational approaches for analyzing latent social structures in open source organizing. International Conference on Information Systems, Milan, Italy.Google Scholar
Marsland, S. (2014). Machine Learning: An Algorithmic Perspective. Boca Raton, FL: CRC Press.Google Scholar
Miles, M. B., Huberman, A. M. and Saldaña, J. (2014). Qualitative Data Analysis: A Methods Sourcebook, 3rd edition. Thousand Oaks, CA: Sage.Google Scholar
Moreno, J. L. (1934). Who Shall Survive? A New Approach to the Problem of Human Interrelations. Washington, DC: Nervous and Mental Disease Publishing Co.Google Scholar
Moretti, F. (2013). ‘Operationalizing’: or, the function of measurement in modern literary theory. Journal of English Language and Literature, 60(1), 319.Google Scholar
Müller, O., Junglas, I., vom Brocke, J. and Debortoli, S. (2016). Utilizing big data analytics for information systems research: Challenges, promises and guidelines. European Journal of Information Systems, 2(1), 289302.Google Scholar
Østerlund, C., Crowston, K. and Jackson, C. (2020). Building an apparatus: Refractive, reflective & diffractive readings of trace data. Journal of the Association for Information Systems, 21(1), 143.Google Scholar
Pentland, B. T., Liu, P., Kremser, W. and Hærem, T. (2020a). The dynamics of drift in digitized processes. MIS Quarterly: Management Information Systems, 44(1), 1947.Google Scholar
Pentland, B. T., Recker, J., Wolf, J. R. and Wyner, G. (2020b). Bringing context inside process research with digital trace data. Journal of the Association for Information Systems, 21(5), 12141236.Google Scholar
Prell, C. (2012). Social Network Analysis: History, Theory & Method. London, New Delhi, Singapore, Los Angeles, CA and Washington, DC: Sage.Google Scholar
Ritschard, G., Gabadinho, A., Muller, N. S. and Studer, M. (2008). Mining event histories: A social science perspective. International Journal of Data Mining, Modelling and Management, 1(1), 6890.Google Scholar
Rogers, R. (2013). Digital Methods. Cambridge, MA: MIT Press.Google Scholar
Rogers, R. (2009). New media & digital culture. Text prepared for the inaugural speech, Chair, University of Amsterdam, May, pp. 1–25.Google Scholar
Salganik, M. (2017). Bit by Bit: Social Research in the Digital Age. Princeton, NJ: Princeton University Press.Google Scholar
Salton, G., Wong, A. and Yang, C. (1975). A vector space model for automatic indexing. Communications of the ACM, 18(11), 613620.Google Scholar
Scott, J. (1994). Social network analysis. Journal of the British Sociological Association, 22(1), 109127.Google Scholar
Sievert, C. and Shirley, K. (2014). LDAvis: A method for visualizing and interpreting topics. Proceedings of the Workshop on Interactive Language Learning, Visualization, and Interfaces, Baltimore, MD.Google Scholar
Sinclair, B. (2016). Network structure and social outcomes: Network analysis for social science. In Alvarez, M. R. (ed.), Computational Social Science: Discovery and Prediction. New York, NY: Cambridge University Press, pp. 121140.Google Scholar
Steyvers, M. and Griffiths, T. (2007). Probabilistic topic models. Handbook of Latent Semantic Analysis, 427(7), 424440.Google Scholar
Svahn, F., Henfridsson, O. and Yoo, Y. (2009). Mangling the sociomateriality of technological regimes in digital innovation. International Conference Information Systems, Phoenix, AZ.Google Scholar
Trier, M. (2008). Research note – towards dynamic visualization for understanding evolution of digital communication networks. Information Systems Research, 19(3), 335350.CrossRefGoogle Scholar
Urquhart, C. (2001). An encounter with grounded theory: Tackling the practical and philosophical issues. In Trauth, E. M. (ed.), Qualitative Research in IS: Issues and Trends. London and Hershey, PA: Idea Group Publishing, pp. 104140.Google Scholar
Urquhart, C., Lehmann, H. and Myers, M. D. (2009). Putting the ‘theory’ back into grounded theory: Guidelines for grounded theory studies in information systems. Information Systems Journal, 20(4), 357381.Google Scholar
Venturini, T. (2012). Building on faults: How to represent controversies with digital methods. Public Understanding of Science, 21(7), 796812.Google Scholar
Venturini, T. (2009). Diving in magma: How to explore controversies with actor-network theory. Public Understanding of Science, 19(3), 258273.CrossRefGoogle Scholar
Venturini, T., Bounegru, L., Gray, J. and Rogers, R. (2018). A reality check(-list) for digital methods. New Media & Society, 22(2), 317341.Google Scholar
Venturini, T. and Latour, B. (2010). The social fabric: Digital traces and quali-quantitative methods. Proceedings of Future En Seine, Paris, France.Google Scholar
Wasserman, S. and Faust, K. (1994). Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press.Google Scholar
Weltevrede, E. (2016). Repurposing digital methods: The research affordances of platforms and engines. PhD dissertation, University of Amsterdam.Google Scholar
Whelan, E., Teigland, R., Vaast, E. and Butler, B. (2016). Expanding the horizons of digital social networks: Mixing big trace datasets with qualitative approaches. Information and Organization, 26(1–2), 112.Google Scholar
Wickham, H. (2014). Tidy data. Journal of Statistical Software, 59(10), 123.Google Scholar
Wild, F. and Stahl, C. (2007). Investigating unstructured texts with latent semantic analysis. In Decker, R. and Lenz, H.-J. (eds), Advances in Data Analysis. Berlin and Heidelberg, Germany: Springer, pp. 383390.Google Scholar
Yoo, Y., Henfridsson, O. and Lyytinen, K. (2010). The new organizing logic of digital innovation: An agenda for information systems research. Information Systems Research, 21(4), 724735.Google Scholar
Zachariadis, M., Scott, S. and Barrett, M. (2013). Bridging the qualitative-quantitative divide: Guidelines for conducting mixed-method research in information systems. MIS Quarterly, 37(3), 855879.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×