Identify the it artifact in the paper and its type

Assignment Help Business Management
Reference no: EM131201858

The objective of this assignment is to gain a deeper understanding of the concepts described in the design research methodology papers (Hevner et al., 2004; Peffers et al., 2007) by analyzing papers that employ the methodology. The papers are available in the content section on D2L

Part I. For each of the 2 papers below identify the research methodology adopted in the paper and provide an explanation for your selection. If design research, identify the IT artifact.

Lamberti, D. and W. Wallace (1990). "Intelligent Interface Design: An Empirical Assessment of Knowledge Presentation in Expert Systems." Management Information Systems Quarterly 14(1): 14.

Eryilmaz, Evren; Ryan, Terry; van der Pol, Jakko; Kasemvilas, Sumonta; and Mary, Justin (2013) "Fostering Quality and Flow of Online Learning Conversations by Artifact-Centered Discourse Systems," Journal of the Association for Information Systems: Vol. 14: 1

Part II. Select any 2 papers from the article list below and analyze the paper from a design research perspective. Answer the following questions.

What are the authors' research objectives and key contributions in this the paper?

Identify the IT artifact(s) in the paper and its type (construct, model, method or instantiation).

Analyze the paper with respect to "7 Guidelines for Design Research" (Hevner et al., 2004). Follow a format similar to the 3 cases in Hevner et al. (2004), on pages 91-97.

Identify the research process components in the paper that correspond to the activities described in Peffers et al. (2007). Use a format similar to the 4 case studies presented in the Peffers et al. (2007) paper.

Article List

Schmeil, Andreas; Eppler, Martin J.; and de Freitas, Sara (2012) "A Structured Approach for Designing Collaboration Experiences for Virtual Worlds," Journal of the Association for Information Systems: Vol. 13: Iss. 10, Article 2.

Cheng, Jiesi; Sun, Aaron; Hu, Daning; and Zeng, Daniel (2011) "An Information Diffusion-Based Recommendation Framework for Micro-Blogging," Journal of the Association for Information Systems: Vol. 12: Iss. 7, Article 2.

Chen, Rui; Sharman, Raj; Rao, H. Raghav; Upadhyaya, Shambhu J. (2013) Data model development for fire related extreme events: an activity theory approach. MIS Quarterly. Mar 2013, Vol. 37 Issue 1, p125-147. 31p. 2

VanderMeer, Debra; Dutta, Kaushik; Datta, Anindya.(2012) A cost-based database request distribution technique for online e-commerce applications. MIS Quarterly. Jun2012, Vol. 36 Issue 2, p479-507. 30p. 7

Reinecke, Katharina; Bernstein, Abraham (2013) Knowing what a user likes: a design science approach to interfaces that automatically adapt to culture. MIS Quarterly. Jun2013, Vol. 37 Issue 2, p427-A11. 38p

Leimeister, J. M., Ebner, W. and Krcmar, H. (2005) "Design, Implementation, and Evaluation of Trust-Supporting Components in Virtual Communities for Patients", Journal of Management Information Systems, 21(4):101-136.

Adomavicius, G., R. Sankaranarayanan, et al. (2005). "Incorporating contextual information in recommender systems using a multidimensional approach." ACM Transactions on Information Systems (TOIS) 23(1): 103-145.

Garfinkel, R., R. Gopal, et al. (2007). "Releasing Individually Identifiable Microdata with Privacy Protection Against Stochastic Threat: An Application to Health Information." Information Systems Research 18(1): 23.

Ram, S. and J. Park (2004). "Semantic Conflict Resolution Ontology (SCROL): An Ontology for Detecting and Resolving Data and Schema-Level Semantic Conflicts." IEEE Transactions on Knowledge and Data Engineering, 189-202.

Sun, L., R. P. Srivastava, et al. (2006). "An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions." Journal of Management Information Systems 22(4): 109-142.

Yue, W. T. and M. Cakanyildirim (2007). "Intrusion Prevention in Information Systems: Reactive and Proactive Responses." Journal of Management Information Systems 24(1): 329-353.

Mohammad M. Masud, Tahseen M. Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham. 2008. Cloud-based malware detection for evolving data streams. ACM Trans. Manage. Inf. Syst. 2, 3, Article 16 (October 2008), 27 pages. DOI=10.1145/2019618.2019622https://doi.acm.org/10.1145/2019618.2019622

Shing-Han Li, Yu-Cheng Kao, Zong-Cyuan Zhang, Ying-Ping Chuang, and David C. Yen. 2015. A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means. ACM Trans. Manage. Inf. Syst. 6, 1, Article 3 (April 2015), 30 pages. DOI=10.1145/2676869 https://doi.acm.org/10.1145/2676869.

Reference no: EM131201858

Questions Cloud

Return net cash inflows : What is the incremental cash flow for a company that foregoes $6,000 pa in rental for factory space in order to mamnufacture a product that will return net cash inflows os $20,000 pa?
Find ways to enhance market power by pooling : Find economies of scope. Provide examples of specific actions Harley-Davidson's managers could take to reduce expenses or share activities through horizontal relationships across brands.
Net proceeds from the sale of a bond : What are the net proceeds from the sale of a bond? What are flotation costs, and how do they affect a bond's net proceeds?
Determine the time constant of the circuit for t > 0 : Just before the switch is opened at t = 0 in Figure P5.1, the current through the inductor is 1.70 mA in the direction shown.
Identify the it artifact in the paper and its type : What are the authors' research objectives and key contributions in this the paper? Identify the IT artifact(s) in the paper and its type (construct, model, method or instantiation).
Which project should the management choose and why : Film Animation Ltd wishes to expand and has £800,000 to invest.- Which project should the management choose, and why?
How might you apply what you learned in your interview : How might you apply what you learned in your interview and about innovation architecture in general to help foster a culture of innovation within your own organization?
Normal practice to form a washout valve : Why are two gate valves required in normal practice to form a washout valve?
Illustrate an example when a financial market practitioner : Explain and illustrate an example when a financial market practitioner (including a security analyst) would use CAPM instead of the other models mentioned above.

Reviews

Write a Review

Business Management Questions & Answers

  Company handled the issue

Identify a major business incident that occurred at least 2 years ago. Briefly describe the incident and then provide an analysis of the way the company handled the issue?

  Professional association of civil engineer code of ethics

The professional association of civil engineers has accepted a ‘Code of Ethics.' One endowment of the Code prohibits members of the association from discussing prices with a potential customer until after the customer had chosen an engineer.

  Identifying and evaluating the communications processes

Evidence of research and information gathering, including having accessed the e-resources site. Each individual team member must demonstrate their own research

  How leadership best practices influence the organization

Write a paper of 1,250-1,500 words in which you discuss how leadership best practices influence the organization to be competitive in the global environment.

  Analyze the strategic choices of coke and pepsi

Analyze the strategic choices of Coke and Pepsi at the business, functional, corporate levels.

  Photosynthesis and cellular respiration matrix

What is the purpose of this pathway? Reactants: What does this reaction need to proceed? Products: What is produced because of the reaction?

  Illustrate what issues are likely to arise in a country

Illustrate what issues are likely to arise in a developing country when a global giant like Coca-Cola begins operations there and what kinds of advantages does such an expansion bring to the globalizing organization?

  Building alarm floor planphysical security draw a facility

building alarm floor planphysical security. draw a facility floor plansubmit a drawing as close to scale as possible of

  Write description of a real world example of an mnc

Description of a real world example of an MNC that uses one of the models you researchedHow does this organization coordinate and transfer useful knowledge across borders

  Question regarding the theoretical contract price

Assume that the Treasury yield curve is flat at 3.2 percent and the annualized dividend yield on the S&P index is 1.8 percent. Using the cost of carry model, demonstrate what the theoretical contract price should be for a futures position expiring..

  Identify the primary benefits of byod in organizations

Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience

  Condition and potential complications

Ralph had polio as a boy and was partially paralyzed in one lower limb for over a year. Although no longer paralyzed, he now has a severe lateral curvature of the lumbar spine. Explain what has happened and identify his condition and potential com..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd