The objective of this assignment is to gain a deeper understanding of the concepts described in the design research methodology papers (Hevner et al., 2004; Peffers et al., 2007) by analyzing papers that employ the methodology. The papers are available in the content section on D2L
Part I. For each of the 2 papers below identify the research methodology adopted in the paper and provide an explanation for your selection. If design research, identify the IT artifact. (30pts)
- Lamberti, D. and W. Wallace (1990). “Intelligent Interface Design: An Empirical Assessment of Knowledge Presentation in Expert Systems.” Management Information Systems Quarterly 14(1): 14.
- Eryilmaz, Evren; Ryan, Terry; van der Pol, Jakko; Kasemvilas, Sumonta; and Mary, Justin (2013) “Fostering Quality and Flow of Online Learning Conversations by Artifact-Centered Discourse Systems,” Journal of the Association for Information Systems: Vol. 14: 1
Part II. Select any 2 papers from the article list below and analyze the paper from a design research perspective. Answer the following questions. (2×30 =60pts)
- What are the authors’ research objectives and key contributions in this the paper? (5pt)
- Identify the IT artifact(s) in the paper and its type (construct, model, method or instantiation). (5pts)
- Analyze the paper with respect to “7 Guidelines for Design Research” (Hevner et al., 2004). Follow a format similar to the 3 cases in Hevner et al. (2004), on pages 91-97. (10pts)
- Identify the research process components in the paper that correspond to the activities described in Peffers et al. (2007). Use a format similar to the 4 case studies presented in the Peffers et al. (2007) paper. (10pts)
Article List
- Schmeil, Andreas; Eppler, Martin J.; and de Freitas, Sara (2012) “A Structured Approach for Designing Collaboration Experiences for Virtual Worlds,” Journal of the Association for Information Systems: Vol. 13: Iss. 10, Article 2.
- Cheng, Jiesi; Sun, Aaron; Hu, Daning; and Zeng, Daniel (2011) “An Information Diffusion-Based Recommendation Framework for Micro-Blogging,” Journal of the Association for Information Systems: Vol. 12: Iss. 7, Article 2.
- Chen, Rui; Sharman, Raj; Rao, H. Raghav; Upadhyaya, Shambhu J. (2013) Data model development for fire related extreme events: an activity theory approach. MIS Quarterly. Mar 2013, Vol. 37 Issue 1, p125-147. 31p. 2
- VanderMeer, Debra; Dutta, Kaushik; Datta, Anindya.(2012) A cost-based database request distribution technique for online e-commerce applications. MIS Quarterly. Jun2012, Vol. 36 Issue 2, p479-507. 30p. 7
- Reinecke, Katharina; Bernstein, Abraham (2013) Knowing what a user likes: a design science approach to interfaces that automatically adapt to culture. MIS Quarterly. Jun2013, Vol. 37 Issue 2, p427-A11. 38p
- Leimeister, J. M., Ebner, W. and Krcmar, H. (2005) “Design, Implementation, and Evaluation of Trust-Supporting Components in Virtual Communities for Patients”, Journal of Management Information Systems, 21(4):101-136.
- Adomavicius, G., R. Sankaranarayanan, et al. (2005). “Incorporating contextual information in recommender systems using a multidimensional approach.” ACM Transactions on Information Systems (TOIS) 23(1): 103-145.
- Garfinkel, R., R. Gopal, et al. (2007). “Releasing Individually Identifiable Microdata with Privacy Protection Against Stochastic Threat: An Application to Health Information.” Information Systems Research 18(1): 23.
- Ram, S. and J. Park (2004). “Semantic Conflict Resolution Ontology (SCROL): An Ontology for Detecting and Resolving Data and Schema-Level Semantic Conflicts.” IEEE Transactions on Knowledge and Data Engineering, 189-202.
- Sun, L., R. P. Srivastava, et al. (2006). “An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions.” Journal of Management Information Systems 22(4): 109-142.
- Yue, W. T. and M. Cakanyildirim (2007). “Intrusion Prevention in Information Systems: Reactive and Proactive Responses.” Journal of Management Information Systems 24(1): 329-353.
- Mohammad M. Masud, Tahseen M. Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham. 2008. Cloud-based malware detection for evolving data streams. ACM Trans. Manage. Inf. Syst. 2, 3, Article 16 (October 2008), 27 pages. DOI=10.1145/2019618.2019622 http://doi.acm.org/10.1145/2019618.2019622
- Shing-Han Li, Yu-Cheng Kao, Zong-Cyuan Zhang, Ying-Ping Chuang, and David C. Yen. 2015. A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means. ACM Trans. Manage. Inf. Syst. 6, 1, Article 3 (April 2015), 30 pages. DOI=10.1145/2676869 http://doi.acm.org/10.1145/2676869