Design Science method and theory in a construction and engineering context: “a phronetic tale of research”

2016 ◽  
Vol 6 (2-4) ◽  
pp. 64-77
Author(s):  
Sittimont Kanjanabootra
2015 ◽  
Vol 56 ◽  
Author(s):  
Keshnee Padayachee

The insider threat concern is a complex issue, as the problem domain intersects the social, technical and socio-technical dimensions. Consequently, counteracting the insider threat involves influencing the insider’s perceptions and behaviour in order to ensure compliance. When an individual’s actions and beliefs are incongruent, this induces a phenomenon known as cognitive dissonance. In order to reduce this dissonance, individuals are self-motivated either to change their behaviours or beliefs, or to rationalize their behaviour. Neutralization is a technique used by criminals to rationalize maleficence. In terms of the insider threat, it has been proposed that if the justifications for committing an offence are eliminated, then the insider is less likely to commit the offence. This process is known as neutralization mitigation. The research reported on here proposes that inducing cognitive dissonance may be a means of mitigating the neutralizations that the insider may use to justify maleficence. To integrate these concepts into a pragmatic implementable solution the Insider Threat Neutralization Mitigation model predicated on Cognitive Dissonance (ITNMCD) is proposed. A proof-of-concept was developed and the model concept was evaluated using the design science method.


Author(s):  
Kristian Rother ◽  
Inga Karl ◽  
Simon Nestler

Usability testing is expensive in some domains due to the resource requirements that go hand in hand with taking a complex context of use into account. Crisis-related research is one such domain, typically requiring the reenactment of an extensive crisis scenario. To lessen the resource requirements and provide a more flexible setup geared towards testing, crisis scenarios can be reconstructed as virtual reality simulations. This paper outlines the development of an initial prototype of such a simulation following the design science method. The prototype is used to test if injecting an item that will be tested into the simulation affects the realism of the virtual reality crisis simulation. The realism was measured in a within-subject experiment and equivalence tests showed that injecting a representation of a simple app had no significant influence on the realism of the simulation.


2018 ◽  
pp. 164-179 ◽  
Author(s):  
Kristian Rother ◽  
Inga Karl ◽  
Simon Nestler

Usability testing is expensive in some domains due to the resource requirements that go hand in hand with taking a complex context of use into account. Crisis-related research is one such domain, typically requiring the reenactment of an extensive crisis scenario. To lessen the resource requirements and provide a more flexible setup geared towards testing, crisis scenarios can be reconstructed as virtual reality simulations. This paper outlines the development of an initial prototype of such a simulation following the design science method. The prototype is used to test if injecting an item that will be tested into the simulation affects the realism of the virtual reality crisis simulation. The realism was measured in a within-subject experiment and equivalence tests showed that injecting a representation of a simple app had no significant influence on the realism of the simulation.


1981 ◽  
Vol 2 (2) ◽  
pp. 118-121
Author(s):  
Reg Talbot

2020 ◽  
Author(s):  
Sami S. Binyamin ◽  
Md. Rakibul Hoque ◽  
Bassam Abdulwahab Zafar

BACKGROUND Hajj pilgrims are often affected by the risks of rapid spread of communicable diseases. Such risks have emerged intensively more than ever before the recent COVID-19 pandemic. With regard to that, previous study has recommended for Hajj surveillance data management systems for efficient control of health risks. As preventive measure, however, no previous studies have followed design science method to develop any framework for ultimately developing any interactive technological intervention for pandemic risk management, especially in the context of Hajj. OBJECTIVE The objective of this study was to use a design science method for developing framework that would guide the researchers and policy makers in using IoT and mobile apps in combination for pandemic risk management during Hajj. METHODS This study followed the design science method consisting of three cycles (namely, Relevance Cycle, Design Cycle, and Rigor Cycle). The design science-based framework allows to develop a technological solution (e.g., mobile app) for a problem through a series of actions using expertise and iteration. It takes into account the factors of people, system configurations, technologies, and work environment that interplay together. RESULTS Upon following the design science method, a conceptual framework has been developed for pandemic risk management during Hajj. The framework would guide the researchers in developing features like, 1) path guidance system, 2) advising system, 3) alert system, 4) assistance delivery system, and 5) bigdata and situation analysis system for pandemic risk management at the event of Hajj. CONCLUSIONS The design science-based framework will also help the Saudi Arabian government to modernize the country’s current capacity to ensure effective management of pandemic risks services through developing additional modern surveillance techniques and strategies. Furthermore, the development of IoT and mobile app based interactive system using this framework will also contribute in big data based predictive analysis because of integration of IoT system which will generate large amount to useful data.


Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 9
Author(s):  
Birgul Kutlu ◽  
Yeliz Gunal Aggul ◽  
Idil Atasu ◽  
Zeynep Kaymaz

This meta-analysis examines the studies on groupware published between the years 2010 and 2020. Descriptive analysis was conducted to determine the distribution of studies in terms of publication year, time–space matrix category, targeted sectors, research methods, and the academic field of the journals that published these studies. Although groupware played a significant role in communication, collaboration, and coordination of users in various collaborative work conditions and sectors, the majority of studies focused on asynchronous and distributed collaborative work environments in the software engineering field, and the research method preferred was design science.


Author(s):  
Flávio Horita E.A. ◽  
Fabio Gomes Rocha ◽  
Layse Santos Souza ◽  
Gustavo R. Gonzales

Author(s):  
Jan vom Brocke ◽  
Marie-Sophie Baier ◽  
Theresa Schmiedel ◽  
Katharina Stelzl ◽  
Maximilian Röglinger ◽  
...  

AbstractContext awareness is essential for successful business process management (BPM). So far, research has covered relevant BPM context factors and context-aware process design, but little is known about how to assess and select BPM methods in a context-aware manner. As BPM methods are involved in all stages of the BPM lifecycle, it is key to apply appropriate methods to efficiently use organizational resources. Following the design science paradigm, the study at hand addresses this gap by developing and evaluating the Context-Aware BPM Method Assessment and Selection (CAMAS) Method. This method assists method engineers in assessing in which contexts their BPM methods can be applied and method users in selecting appropriate BPM methods for given contexts. The findings of this study call for more context awareness in BPM method design and for a stronger focus on explorative BPM. They also provide insights into the status quo of existing BPM methods.


Logistics ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 37
Author(s):  
Serkan Alacam ◽  
Asli Sencer

In the global trucking industry, vertical collaboration between shippers and carriers is attained by intermediaries, called brokers. Brokers organize carriers for a shipper in accordance with its quality and price requirements, and support carriers to collaborate horizontally by sharing a large distribution order from a shipper. Brokers also act as trustees, preventing the passing of private information of any party to the others. Despite these benefits, intermediaries in the trucking industry are involved in several sustainability problems, including high costs, high levels of carbon emissions, high percentages of empty miles, low-capacity utilizations, and driver shortages. Several studies have acknowledged the importance of improving collaboration to address these problems. Obviously, the major concern of brokers is not collaboration, but rather to optimize their own gains. This paper investigates the potential of blockchain technology to improve collaboration in the trucking industry, by eliminating brokers while preserving their responsibilities as organizers and trustees. This paper extends the transportation control tower concept from the logistics literature, and presents a system architecture for its implementation through smart contracts on a blockchain network. In the proposed system, the scalability and privacy of trucking operations are ensured through integration with privacy-preserving off-chain computation and storage solutions (running outside of the blockchain). The potential of this design artifact for fostering collaboration in the trucking industry was evaluated by both blockchain technology experts and trucking industry professionals.


Sign in / Sign up

Export Citation Format

Share Document