Identify the research process components in the paper

Assignment Help Other Subject
Reference no: EM13833990

The objective of this assignment is to gain a deeper understanding of the concepts described in the design research methodology papers (Hevner et al., 2004; Peffers et al., 2007) by analyzing papers that employ the methodology. The papers are available in the content section on D2L

Part I. For each of the 2 papers below identify the research methodology adopted in the paper and provide an explanation for your selection. If design research, identify the IT artifact. 

1. Lamberti, D. and W. Wallace (1990). "Intelligent Interface Design: An Empirical Assessment of Knowledge Presentation in Expert Systems." Management Information Systems Quarterly 14(1): 14.

2. Eryilmaz, Evren; Ryan, Terry; van der Pol, Jakko; Kasemvilas, Sumonta; and Mary, Justin (2013) "Fostering Quality and Flow of Online Learning Conversations by Artifact-Centered Discourse Systems," Journal of the Association for Information Systems: Vol. 14: 1

Part II. Select any 2 papers from the article list below and analyze the paper from a design research perspective. Answer the following questions. 

1. What are the authors’ research objectives and key contributions in this the paper? 

2. Identify the IT artifact(s) in the paper and its type (construct, model, method or instantiation). 

3. Analyze the paper with respect to “7 Guidelines for Design Research” (Hevner et al., 2004). Follow a format similar to the 3 cases in Hevner et al. (2004), on pages 91-97. 

4. Identify the research process components in the paper that correspond to the activities described in Peffers et al. (2007). Use a format similar to the 4 case studies presented in the Peffers et al. (2007) paper.

Article List

1. Schmeil, Andreas; Eppler, Martin J.; and de Freitas, Sara (2012) "A Structured Approach for Designing Collaboration Experiences for Virtual Worlds," Journal of the Association for Information Systems: Vol. 13: Iss. 10, Article 2.

2. Cheng, Jiesi; Sun, Aaron; Hu, Daning; and Zeng, Daniel (2011) "An Information Diffusion-Based Recommendation Framework for Micro-Blogging," Journal of the Association for Information Systems: Vol. 12: Iss. 7, Article 2.

3. Chen, Rui; Sharman, Raj; Rao, H. Raghav; Upadhyaya, Shambhu J. (2013) Data model development for fire related extreme events: an activity theory approach.   MIS Quarterly. Mar 2013, Vol. 37 Issue 1, p125-147. 31p. 2

4. VanderMeer, Debra; Dutta, Kaushik; Datta, Anindya.(2012) A cost-based database request distribution technique for online e-commerce applications.   MIS Quarterly. Jun2012, Vol. 36 Issue 2, p479-507. 30p. 7

5. Reinecke, Katharina; Bernstein, Abraham (2013) Knowing what a user likes: a design science approach to interfaces that automatically adapt to culture. MIS Quarterly. Jun2013, Vol. 37 Issue 2, p427-A11. 38p

6. Leimeister, J. M.,  Ebner, W.  and  Krcmar, H. (2005) “Design, Implementation, and Evaluation of Trust-Supporting Components in Virtual Communities for Patients”, Journal of Management Information Systems, 21(4):101-136.

7. Adomavicius, G., R. Sankaranarayanan, et al. (2005). "Incorporating contextual information in recommender systems using a multidimensional approach." ACM Transactions on Information Systems (TOIS) 23(1): 103-145.

8. Garfinkel, R., R. Gopal, et al. (2007). "Releasing Individually Identifiable Microdata with Privacy Protection Against Stochastic Threat: An Application to Health Information." Information Systems Research 18(1): 23.

9. Ram, S. and J. Park (2004). "Semantic Conflict Resolution Ontology (SCROL): An Ontology for Detecting and Resolving Data and Schema-Level Semantic Conflicts." IEEE Transactions on Knowledge and Data Engineering, 189-202.

10. Sun, L., R. P. Srivastava, et al. (2006). "An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions." Journal of Management Information Systems 22(4): 109-142.

11. Yue, W. T. and M. Cakanyildirim (2007). "Intrusion Prevention in Information Systems: Reactive and Proactive Responses." Journal of Management Information Systems 24(1): 329-353.

12. Mohammad M. Masud, Tahseen M. Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham. 2008. Cloud-based malware detection for evolving data streams. ACM Trans. Manage. Inf. Syst. 2, 3, Article 16 (October 2008), 27 pages. DOI=10.1145/2019618.2019622 https://doi.acm.org/10.1145/2019618.2019622

13. Shing-Han Li, Yu-Cheng Kao, Zong-Cyuan Zhang, Ying-Ping Chuang, and David C. Yen. 2015. A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means. ACM Trans. Manage. Inf. Syst. 6, 1, Article 3 (April 2015), 30 pages. DOI=10.1145/2676869 https://doi.acm.org/10.1145/2676869

Reference no: EM13833990

Questions Cloud

Fable on the conversation between the bear and the horse : Write a fable on the conversation between the bear and the horse.The conversation between two animals of your own choosing.Each should followed by a sentence that tells us the moral of your story.Each should have dialogue between the two animals and ..
Impact how a company calculates the value of a customer : From an economic standpoint are some customers worth more to a company than other customers. What factors impact how a company calculates the value of a customer?
What is the price elasticity of demand for gizmos : Where, q is the quantity demanded at price p when the person’s income is I. Assume initially that the person’s income is $40,000. Show your work/ calculations. At what price will demand fall to zero? At a price of $10, what is the price elasticity of..
How much for each pair of slacks and each sports coat : Alex took clothes to the cleaners three times last month. First, he brought 4 shirts and 1 pair of slacks and paid $14.45. Then he brought 6 shirts, 4 pairs of slacks, and 1 sports coat and paid $40.39. Finally, he brought 3 shirts and 1 sports coat ..
Identify the research process components in the paper : INFS 805 What are the authors’ research objectives and key contributions in this the paper? Identify the IT artifact(s) in the paper and its type (construct, model, method or instantiation). Analyze the paper with respect to “7 Guidelines for Design ..
What is the current value of the firm to the owners : A struggling company currently has a total value of $700,000. It owes $500,000 from debt financing (assume these are loans from the bank if you wish). The value of the company to the owners is the difference between the total value and the amount owe..
Are there wealth-creating transactions-information asymmetry : Suppose there are two types of people who need health insurance; high-risk and low-risk consumers. High-risk consumers have a relatively high probability of needing expensive medical care and on average incur $2,000 of medical expenses per year. Are ..
Key characteristic of a strategic plan : How will understanding the parts of a well constructed strategic plan allow you to augment an executive teams current strategic plan? What key characteristic of a strategic plan is the most difficult to execute
About estimating the different probabilities of alternatives : How would you go about estimating the different probabilities of three alternatives occurring if you have little empirical data on which to base your estimates?

Reviews

Write a Review

Other Subject Questions & Answers

  Major features of black holes

Discuss the causes, characteristics, and major features of black holes. Explain why the concept of a black hole does or doesn't seem reasonable to you and provide some rationale for your views? i need two paragraph for this discussion. and n..

  What makes contracts difficult to read or comprehend

Many times we have a contract in front of us and we merely scan it and then sign it. Discuss what makes contracts difficult to read or comprehend. Identify and then explain the two most important elements of a contract that every manager should know ..

  Pocket dosimeter-what is the voltage across the chamber

A 50-?C/kg (?200 mR) pocket dosimeter with air-equivalent walls has a sensitive volume with the dimensions 0.5 in. (diameter) and 2.5 in. (length); the volume is filled with air at atmospheric pressure. The capacitance of the dosimeter is 10 pF. If 2..

  Difference between individual and institutional discrimion

the difference between individual and institutional discrimination

  Sustained copetitive advantage-distinctive compentence

If your company had a clear distinctive competance in some activity or functional area what sort of things might you do to protect that strength to turn it into the sustained copetitive advantage?

  Right to believe

Does everyone have a right to believe what one wants? The answer would be yes but a qualified "yes".

  Special perceptual process

In an evolutionary sense, why would it be important for us to have this "special" perceptual process, even at an infant stage?

  Traditional methods of classifying a generation

Are traditional methods of classifying a generation still meaningful in a diverse and changing nation? Using a psychological, sociological, and behavioral viewpoints. In addition, show the traditional (demographic) methods for classifying generations..

  Explaining the union representation election

If a representation election is held, the union is certified if greater than what percent of the voters cast a "yes" vote in favor of a union?

  Explain differences in marriage and family life which are

wite a 1000-word minimum paper.nbsp families have changed greatly over the past 60 years and they continue to become

  Different approaches to compiling class templates

Some overloaded operators, such as assignment operators and array subscript operators, must be members of that class. Briefly Speculate about the reasoning behind this requirement.Briefly discuss different approaches to compiling class templates; dis..

  Read romeo and juliet by william shakespeare and answer the

read romeo and juliet by william shakespeare and answer the questions below1 criticism of the play has been directed at

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd