8 research outputs found

    Deploying design science research in graduate computing studies in South Africa

    Get PDF
    Design science research is a relatively recent paradigm, which has enjoyed more acceptance in information systems than in computer science. Yet researchers are increasingly accepting this new paradigm where artifacts are to be developed to solve a problem, and the knowledge that is derived during the process is recorded and contributes to the field of knowledge. It is also particularly applicable in a developing world context. In this paper we present two case studies, demonstrating how two postgraduate students used design science research during their research. We reflect on the lessons learned and explain how design science research can be an attractive option for graduate student research at masters and doctoral level in both Information Systems and Computer Science

    An Analysis of Design Science Research Adoption in Doctoral Projects in Australia

    Get PDF
    Contribution in Information Systems (IS) research is a significant concern for authors, reviewers and editors. We argue that the criteria of novelty and utility are insufficient to evaluate the contribution of a research paper. We expand upon Kuhn’s disciplinary matrix of shared commitments to symbolic generalization, exemplars and model/theory as the background to which every contribution is oriented. Cogency or persuasiveness of research is the result of logic, dialectic, rhetoric, and social-institutional argumentation in relation to the disciplinary matrix. We use three examples of published research to illustrate how these elements can be combined to frame research as a contribution in relation to the wider IS field. Lastly we discuss the implications for IS when contribution is understood in relation to a disciplinary matrix

    Design Science Research in Doctoral Projects: An Analysis of Australian Theses

    Get PDF
    Design science research (DSR) has gained popularity with doctoral students. In the information systems (IS) discipline, DSR is distinctive in that it creates knowledge through the design of novel or innovative artifacts and analyzes the artifacts’ use or performance. We present an analysis of 40 DSR doctoral theses completed in Australia between 2006-2017. Our purpose is to understand how DSR is applied by the IS community, and one critical source of information is the work of doctoral candidates. How candidates are guided by the literature, the artifacts produced, and their evaluation of the artifacts provide a window into this understanding. We selected the theses from the Australian national repository and analyzed their content. The findings suggest: (1) DSR is evolving and maturing in this cohort, but most candidates fail to enunciate and understand the underlying philosophy of their research approach; (2) the use of relevant guidance is still developing; and (3) the capacity of candidates to theorize about their work remains a challenge, possibly due to problems of scoping DSR projects and ensuing time constraints. In spite of their recognition and appreciation of the need for evaluating DSR artifacts, it is questionable whether doctoral candidates understand that the designs also require evaluation. As in many other areas of IS research, nomenclature in DSR remains problematic and the whole IS community should aim to create better consistency in this regard. This paper contributes toward our understanding of the challenges and advantages of DSR as a research approach for postgraduate studies and offers recommendations to the DSR community

    The Effect of Mobile Gamification on Brand Loyalty

    Get PDF
    [[notice]]補正完

    The development of a computer science curriculum for the higher technical and vocational institutions in Libya

    Get PDF
    Philosophiae Doctor - PhDThe aim of the study was to develop a framework to align the Computer Science curricula of higher technical and vocational institutions in Libya with the curriculum as proposed by the Association for Computing Machinery, but in keeping with the realities of Africa. The graduate attributes, as suggested by the Association for Computing Machinery, were also considered and compared to the work experience of graduates of higher technical and vocational institutions in Libya. Design Science Research was used as the research methodology and both qualitative and quantitative methods were used to collect data. Semi-structured interviews were conducted with graduates from Libyan institutions and questionnaires were administered to employees from different companies and industries in Libya. The results of the investigation were used in the design of the artefact. The study found that in many cases graduates felt that they were not sufficiently prepared for the workplace as they did not possess the necessary graduate attributes. Skills such as abstract reasoning, team work and communication skills seemed to have been overlooked in the Computer Science curricula at tertiary institutions in Libya. It was also observed that the theoretical aspect of Computer Science was emphasised at the institutions and the acquisition of practical skills was neglected. A framework was developed to assist Computer Science educators to track their compliance to the 2013 curriculum of the Association for Computing Machinery in terms of the acquisition of technical skills as well as the development of the necessary graduate attributes. The framework is an important contribution to the development of an internationally competitive Computer Science curriculum for Libya. It will allow Libyan institutions to focus on preparing students for a rapidly changing world

    Design science research in PhD education: designing for assistance tools

    Get PDF
    170 p.scholars. Major conferences have tracks dedicated to DSR, and even leading journals have publishedspecial issues on it. In line with this momentum, DSR has also gained acceptance among PhD students.Indeed, DSR is well regarded for its ability to bring together theoretical and practical knowledge,addressing both rigor and relevance. But in exchange, DSR calls for high levels of commitment andmaturity. PhD students, as they are transitioning towards becoming independent researchers, usually lacksuch maturity. On top of that, the lack of widely accepted software tools for conducting DSR does nothelp.This Thesis is aimed at providing PhD students with tool support for carrying out DSR. To thatend, we focus on problematic situations related to four basic activities conducted throughout thedoctorate: inquiry, reading, writing and peer review. For each of these problems, a purposeful artifact isdesigned, developed and evaluated with real stakeholders. The outcome: DScaffolding and Review&Go,two browser extensions for Google Chrome currently in use by practitioners

    Deploying Design Science Research in Graduate Computing Studies in South Africa

    Get PDF
    Design Science Research is a relatively recent paradigm, which has enjoyed more acceptance Design science research is a relatively recent paradigm, which has enjoyed more acceptance In information systems than in computer science. Yet researchers are increasingly accepting this new paradigm where artifacts are to be developed to solve a problem, and the knowledge that is derived during the process is recorded and contributes to the field of knowledge. It is also particularly applicable in a developing world context. In this paper we present two case studies, demonstrating how two postgraduate students used design science research during their research. We reflect on the lessons learned and explain how design science research can be an attractive option for graduate student research at masters and doctoral level in both Information Systems and Computer Science

    Towards a mobile application to aid law enforcement in diagnosing and preventing mobile bully-victim behaviour in Eastern Free State High Schools of South Africa

    Get PDF
    Mobile bully-victim behaviour is one cyber aggression that is escalating worldwide. Bully-victims are people who bully others but are also victimised by peers. The behaviour of bully-victims therefore swings between that of pure bullies and pure victims, making it difficult to identify and prevent. Prevention measures require the involvement of a number of stakeholders, including communities. However, there has been a lack of whole-community participation in the fight against cyberbullying and the roles of stakeholders are often unclear. We expect the law enforcement in particular, the police, to play a key role in curbing all forms of bullying. This is a challenging task in South Africa as these law enforcement agents often lack the skills and appropriate legislation to address particularly cyber-related bullying. Literature shows that law enforcement agents need to advance their technological skills and also be equipped with digital interventions if they are to diagnose and prevent mobile bully-victim behaviour effectively. This is particularly important in South Africa, where the rate of crime remains one of the highest in the world. The aim of this study was to develop a mobile application that can aid law enforcement in diagnosing and preventing mobile bully-victim behaviour in high schools. As part of requirements to the application development, it identified the impediments to the law enforcement effectiveness in combating mobile bully-victim behaviour. Extensive literature review on the factors influencing mobile bullying and mobile bully-victim behaviour was conducted and an integrative framework for understanding this behaviour and its prevention was developed. In so doing, the dominant behavioural theories were consulted, including the social-ecological theory, social learning theory, social information processing theories, and the theory of planned behaviour, as well as the general strain theory, and the role theory. The conceptual framework developed in this study extended and tailored the “Cyberbullying Continuum of Harm”, enabling inclusive and moderated diagnosis of bullying categories and severity assessment. That is, instead of focusing on mobile bully-victims only, bullies, victims, and those uninvolved were also identified. Also the physical moderation of the identification process by the police helped to minimise dishonest reporting. This framework informed the design, development and evaluation of a mobile application for the law enforcement agents. The Design Science Research (DSR) methodology within pragmatic paradigm and literature guided the development of the mobile application named mobile bullyvictims response system (M-BRS) and its evaluation for utility. The M-BRS features included functions to enable anonymous reporting and confidential assessments of mobile bully-victims effects in school classrooms. Findings from this study confirmed the utility of the M-BRS to identify learners' involvement in mobile bully-victims behaviour through peer nomination and self-nomination. This study also showed that use of the M-BRS has enabled empowerment of marginalised learners, and mitigation of learners' fear to report, providing them with control over mobile bully-victim reporting. In addition, learners using the M-BRS were inclined to report perpetrators through a safe (anonymous and confidential) reporting platform. With the M-BRS, it was much easier to identify categories of bullies, i.e. mobile bully-victims, bullies, victims, and uninvolved. The practical contributions of this study were skills enhancements in reducing the mobile bully-victims behaviour. These included improvement of the police's technical skills to safely identify mobile bully-victims and their characterisation as propagators and retaliators that enabled targeted interventions. This was particularly helpful in response to courts' reluctance to prosecute teenagers for cyberbullying and the South African lack of legislation thereon so that the police are enabled to restoratively address this behaviour in schools. Also, the identification information was helpful to strengthen evidence for reported cases, which was remarkable because sometimes perpetrators cannot be found due to their concealed online identities. Furthermore, this study made possible the surveillance of mobile bully-victims through the M-BRS, which provided the police some control to reducing the mobile bully-victim behaviour. This study provided a practical way for implementing targeted prevention and interventions programmes using relevant resources towards a most efficient solution for mobile bully-victims problem. Since there are not many mobile-based interventions for mobile bully-victim behaviour, this study provided a way in which artefacts' development could be informed by theory, as a new, innovative and practical contribution in research. In so doing, this study contributed to technology applications' ability to modify desired behaviour
    corecore