Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Insider

Practice-Based and Practice-Led Research for Dissertation Development
Sometimes considered on a spectrum with “outsider,” insiders are considered to be those who have a connection to or are embedded in a research site or context, such as teachers conducting research within their classrooms ( Cochran-Smith & Lytle, 1993 ).
Published in Chapter:
Researcher Positionality in the Dissertation in Practice
Jess Smith (Baylor University, USA), Brooke Blevins (Baylor University, USA), Nicholas R. Werse (Baylor University, USA), and Sandra Talbert (Baylor University, USA)
DOI: 10.4018/978-1-7998-6664-0.ch003
Abstract
This chapter explores first the role of researcher perspective in the research process, then the unique nuances of the researcher positionality in dissertations in practice, followed by a discussion of the advantages and limitations of the unique positionality assumed by dissertations in practice. This chapter concludes by noting the importance of constructing conceptual coherence between the implications of the scholarly-practitioner's positionality statement and the discussion of the dissertation's ethical considerations and limitations. The dissertation in practice, more so than with traditional Ph.D. dissertations, assumes that the researcher holds close personal connections to the research site, participants, and contexts. Far from envisioning the researcher as an objective outside observer, the dissertation in practice assumes that the researcher has a vested interest in solving the professional problem of practice within their place of employment in the presence of colleagues. For this reason, the full disclosure of the researcher's positionality becomes all the more important.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Hardware Approach for Trusted Access and Usage Control
a person properly identified by the database server (i.e., a registered user) who tries to get information exceeding her own privileges. The owned privileges give her more abilities than the intruder to tamper the system and to deduce valuable unauthorized content.
Full Text Chapter Download: US $37.50 Add to Cart
The Insider Threat Landscape and the FinTech Sector: Attacks, Defenses, and Emerging Challenges
Someone who is either permanently or temporarily affiliated with the organization (e.g., a permanent employee or a temporary contractor), affiliated with someone in the organization, e.g., an employee’s family member or client, or has gained temporary access to the organization’s internal network, e.g., a remote attacker who has obtained an employee’s credentials to remotely log into an internal system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR