Identify the research process components in the paper

Assignment Help Other Subject
Reference no: EM13833990

The objective of this assignment is to gain a deeper understanding of the concepts described in the design research methodology papers (Hevner et al., 2004; Peffers et al., 2007) by analyzing papers that employ the methodology. The papers are available in the content section on D2L

Part I. For each of the 2 papers below identify the research methodology adopted in the paper and provide an explanation for your selection. If design research, identify the IT artifact. 

1. Lamberti, D. and W. Wallace (1990). "Intelligent Interface Design: An Empirical Assessment of Knowledge Presentation in Expert Systems." Management Information Systems Quarterly 14(1): 14.

2. Eryilmaz, Evren; Ryan, Terry; van der Pol, Jakko; Kasemvilas, Sumonta; and Mary, Justin (2013) "Fostering Quality and Flow of Online Learning Conversations by Artifact-Centered Discourse Systems," Journal of the Association for Information Systems: Vol. 14: 1

Part II. Select any 2 papers from the article list below and analyze the paper from a design research perspective. Answer the following questions. 

1. What are the authors’ research objectives and key contributions in this the paper? 

2. Identify the IT artifact(s) in the paper and its type (construct, model, method or instantiation). 

3. Analyze the paper with respect to “7 Guidelines for Design Research” (Hevner et al., 2004). Follow a format similar to the 3 cases in Hevner et al. (2004), on pages 91-97. 

4. Identify the research process components in the paper that correspond to the activities described in Peffers et al. (2007). Use a format similar to the 4 case studies presented in the Peffers et al. (2007) paper.

Article List

1. Schmeil, Andreas; Eppler, Martin J.; and de Freitas, Sara (2012) "A Structured Approach for Designing Collaboration Experiences for Virtual Worlds," Journal of the Association for Information Systems: Vol. 13: Iss. 10, Article 2.

2. Cheng, Jiesi; Sun, Aaron; Hu, Daning; and Zeng, Daniel (2011) "An Information Diffusion-Based Recommendation Framework for Micro-Blogging," Journal of the Association for Information Systems: Vol. 12: Iss. 7, Article 2.

3. Chen, Rui; Sharman, Raj; Rao, H. Raghav; Upadhyaya, Shambhu J. (2013) Data model development for fire related extreme events: an activity theory approach.   MIS Quarterly. Mar 2013, Vol. 37 Issue 1, p125-147. 31p. 2

4. VanderMeer, Debra; Dutta, Kaushik; Datta, Anindya.(2012) A cost-based database request distribution technique for online e-commerce applications.   MIS Quarterly. Jun2012, Vol. 36 Issue 2, p479-507. 30p. 7

5. Reinecke, Katharina; Bernstein, Abraham (2013) Knowing what a user likes: a design science approach to interfaces that automatically adapt to culture. MIS Quarterly. Jun2013, Vol. 37 Issue 2, p427-A11. 38p

6. Leimeister, J. M.,  Ebner, W.  and  Krcmar, H. (2005) “Design, Implementation, and Evaluation of Trust-Supporting Components in Virtual Communities for Patients”, Journal of Management Information Systems, 21(4):101-136.

7. Adomavicius, G., R. Sankaranarayanan, et al. (2005). "Incorporating contextual information in recommender systems using a multidimensional approach." ACM Transactions on Information Systems (TOIS) 23(1): 103-145.

8. Garfinkel, R., R. Gopal, et al. (2007). "Releasing Individually Identifiable Microdata with Privacy Protection Against Stochastic Threat: An Application to Health Information." Information Systems Research 18(1): 23.

9. Ram, S. and J. Park (2004). "Semantic Conflict Resolution Ontology (SCROL): An Ontology for Detecting and Resolving Data and Schema-Level Semantic Conflicts." IEEE Transactions on Knowledge and Data Engineering, 189-202.

10. Sun, L., R. P. Srivastava, et al. (2006). "An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions." Journal of Management Information Systems 22(4): 109-142.

11. Yue, W. T. and M. Cakanyildirim (2007). "Intrusion Prevention in Information Systems: Reactive and Proactive Responses." Journal of Management Information Systems 24(1): 329-353.

12. Mohammad M. Masud, Tahseen M. Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham. 2008. Cloud-based malware detection for evolving data streams. ACM Trans. Manage. Inf. Syst. 2, 3, Article 16 (October 2008), 27 pages. DOI=10.1145/2019618.2019622 https://doi.acm.org/10.1145/2019618.2019622

13. Shing-Han Li, Yu-Cheng Kao, Zong-Cyuan Zhang, Ying-Ping Chuang, and David C. Yen. 2015. A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means. ACM Trans. Manage. Inf. Syst. 6, 1, Article 3 (April 2015), 30 pages. DOI=10.1145/2676869 https://doi.acm.org/10.1145/2676869

Reference no: EM13833990

Questions Cloud

Fable on the conversation between the bear and the horse : Write a fable on the conversation between the bear and the horse.The conversation between two animals of your own choosing.Each should followed by a sentence that tells us the moral of your story.Each should have dialogue between the two animals and ..
Impact how a company calculates the value of a customer : From an economic standpoint are some customers worth more to a company than other customers. What factors impact how a company calculates the value of a customer?
What is the price elasticity of demand for gizmos : Where, q is the quantity demanded at price p when the person’s income is I. Assume initially that the person’s income is $40,000. Show your work/ calculations. At what price will demand fall to zero? At a price of $10, what is the price elasticity of..
How much for each pair of slacks and each sports coat : Alex took clothes to the cleaners three times last month. First, he brought 4 shirts and 1 pair of slacks and paid $14.45. Then he brought 6 shirts, 4 pairs of slacks, and 1 sports coat and paid $40.39. Finally, he brought 3 shirts and 1 sports coat ..
Identify the research process components in the paper : INFS 805 What are the authors’ research objectives and key contributions in this the paper? Identify the IT artifact(s) in the paper and its type (construct, model, method or instantiation). Analyze the paper with respect to “7 Guidelines for Design ..
What is the current value of the firm to the owners : A struggling company currently has a total value of $700,000. It owes $500,000 from debt financing (assume these are loans from the bank if you wish). The value of the company to the owners is the difference between the total value and the amount owe..
Are there wealth-creating transactions-information asymmetry : Suppose there are two types of people who need health insurance; high-risk and low-risk consumers. High-risk consumers have a relatively high probability of needing expensive medical care and on average incur $2,000 of medical expenses per year. Are ..
Key characteristic of a strategic plan : How will understanding the parts of a well constructed strategic plan allow you to augment an executive teams current strategic plan? What key characteristic of a strategic plan is the most difficult to execute
About estimating the different probabilities of alternatives : How would you go about estimating the different probabilities of three alternatives occurring if you have little empirical data on which to base your estimates?

Reviews

Write a Review

Other Subject Questions & Answers

  Cables and wireless transmission issues

Which application architecture is known for having the lowest cost of infrastructure?

  Describes relationship between identity and socialization

Which of the following best describes the relationship between identity and socialization, according to sociologists?

  What are the possible sources of bioterrorism

What are the possible sources of bioterrorism, and what should we know about it? What events focused national attention on the subject? How likely is a threat is bioterrorism, according to experts? What should local health departments do to prepare f..

  Broke off their relationship

When Mohammed’s girlfriend unexpectedly broke off their relationship, he said it was just as well because he no longer loved her. Yet, Mohammed unconsciously loved her. Mohammed’s response is an example of

  Health care systems around the world

Provide at least two examples of how this country's system compares to the health care system in the United States.

  Drawbacks of a mandatory national identity card

What are the benefits and drawbacks of a mandatory National Identity Card? Specifically address whether the card will be effective in increasing the security of the U.S. or will it infringe on civil liberties.

  Explain how insecticides can increase insect populations

Explain how insecticides can increase insect populations. What are some of the advantages of using sex attractants, rather than poisonous insecticides. What about the "sterile male" technique

  Why community health professional require health issues

Why do community health professionals require addressing health issues differently for different age groups in the community?

  Contrast normal and abnormal psychology

Compare and contrast normal and abnormal psychology. Examine at least two mental disorders and two mental illnesses from the perspective of psychology.

  Brief statistical overview of the country you selected

Familiarize yourself with the World Health Organization (WHO) by visiting its website http://www.who.int/en/. First, identify a country to research (select one which you do not reside). Provide a brief statistical overview of the country you select..

  Outsourcing especially to low labor-cost countries has

outsourcing especially to low labor-cost countries has grown substantially. what are the advantages and disadvantages

  How can managers please stakeholders in remaining ethical

write a double-spaced essaynbspregarding nbsphow can managers please stakeholders while remaining ethical?nbspcompare

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd