An Empirical Assessment of Knowledge Presentation

The objective of this assignment is to gain a deeper understanding of the concepts described in the design research methodology papers (Hevner et al., 2004; Peffers et al., 2007) by analyzing papers that employ the methodology. The papers are available in the content section on D2L

Part I. For each of the 2 papers below identify the research methodology adopted in the paper and provide an explanation for your selection. If design research, identify the IT artifact. (30pts)

  1. Lamberti, D. and W. Wallace (1990). “Intelligent Interface Design: An Empirical Assessment of Knowledge Presentation in Expert Systems.” Management Information Systems Quarterly 14(1): 14.
  2. Eryilmaz, Evren; Ryan, Terry; van der Pol, Jakko; Kasemvilas, Sumonta; and Mary, Justin (2013) “Fostering Quality and Flow of Online Learning Conversations by Artifact-Centered Discourse Systems,” Journal of the Association for Information Systems: Vol. 14: 1

Part II. Select any 2 papers from the article list below and analyze the paper from a design research perspective. Answer the following questions. (2×30 =60pts)

  1. What are the authors’ research objectives and key contributions in this the paper? (5pt)
  2. Identify the IT artifact(s) in the paper and its type (construct, model, method or instantiation). (5pts)
  3. Analyze the paper with respect to “7 Guidelines for Design Research” (Hevner et al., 2004). Follow a format similar to the 3 cases in Hevner et al. (2004), on pages 91-97. (10pts)
  4. Identify the research process components in the paper that correspond to the activities described in Peffers et al. (2007). Use a format similar to the 4 case studies presented in the Peffers et al. (2007) paper. (10pts)

Article List

  1. Schmeil, Andreas; Eppler, Martin J.; and de Freitas, Sara (2012) “A Structured Approach for Designing Collaboration Experiences for Virtual Worlds,” Journal of the Association for Information Systems: Vol. 13: Iss. 10, Article 2.
  2. Cheng, Jiesi; Sun, Aaron; Hu, Daning; and Zeng, Daniel (2011) “An Information Diffusion-Based Recommendation Framework for Micro-Blogging,” Journal of the Association for Information Systems: Vol. 12: Iss. 7, Article 2.
  3. Chen, Rui; Sharman, Raj; Rao, H. Raghav; Upadhyaya, Shambhu J. (2013) Data model development for fire related extreme events: an activity theory approach.   MIS Quarterly. Mar 2013, Vol. 37 Issue 1, p125-147. 31p. 2
  4. VanderMeer, Debra; Dutta, Kaushik; Datta, Anindya.(2012) A cost-based database request distribution technique for online e-commerce applications.   MIS Quarterly. Jun2012, Vol. 36 Issue 2, p479-507. 30p. 7
  5. Reinecke, Katharina; Bernstein, Abraham (2013) Knowing what a user likes: a design science approach to interfaces that automatically adapt to culture. MIS Quarterly. Jun2013, Vol. 37 Issue 2, p427-A11. 38p
  6. Leimeister, J. M.,  Ebner, W.  and  Krcmar, H. (2005) “Design, Implementation, and Evaluation of Trust-Supporting Components in Virtual Communities for Patients”, Journal of Management Information Systems, 21(4):101-136.
  7. Adomavicius, G., R. Sankaranarayanan, et al. (2005). “Incorporating contextual information in recommender systems using a multidimensional approach.” ACM Transactions on Information Systems (TOIS) 23(1): 103-145.
  8. Garfinkel, R., R. Gopal, et al. (2007). “Releasing Individually Identifiable Microdata with Privacy Protection Against Stochastic Threat: An Application to Health Information.” Information Systems Research 18(1): 23.
  9. Ram, S. and J. Park (2004). “Semantic Conflict Resolution Ontology (SCROL): An Ontology for Detecting and Resolving Data and Schema-Level Semantic Conflicts.” IEEE Transactions on Knowledge and Data Engineering, 189-202.
  10. Sun, L., R. P. Srivastava, et al. (2006). “An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions.” Journal of Management Information Systems 22(4): 109-142.
  11. Yue, W. T. and M. Cakanyildirim (2007). “Intrusion Prevention in Information Systems: Reactive and Proactive Responses.” Journal of Management Information Systems 24(1): 329-353.
  12. Mohammad M. Masud, Tahseen M. Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham. 2008. Cloud-based malware detection for evolving data streams. ACM Trans. Manage. Inf. Syst. 2, 3, Article 16 (October 2008), 27 pages. DOI=10.1145/2019618.2019622 http://doi.acm.org/10.1145/2019618.2019622
  13. Shing-Han Li, Yu-Cheng Kao, Zong-Cyuan Zhang, Ying-Ping Chuang, and David C. Yen. 2015. A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means. ACM Trans. Manage. Inf. Syst. 6, 1, Article 3 (April 2015), 30 pages. DOI=10.1145/2676869 http://doi.acm.org/10.1145/2676869