• Home
  • Computer Science
  • Advancing the Impact of Design Science: Moving from Theory by Monica Chiarini Tremblay, Debra VanderMeer, Marcus

Advancing the Impact of Design Science: Moving from Theory by Monica Chiarini Tremblay, Debra VanderMeer, Marcus

By Monica Chiarini Tremblay, Debra VanderMeer, Marcus Rothenberger, Ashish Gupta, Victoria Yoon

This e-book constitutes the completely refereed complaints of the ninth overseas convention on layout technology examine in info structures and know-how, DESRIST 2014, held in Miami, FL, united states in may well 2014. the nineteen complete papers, 7 research-in-progress papers and 18 brief papers describing prototype demonstrations have been conscientiously reviewed and chosen from seventy one submissions. The papers are prepared in topical sections on layout technological know-how; rising topics; meta concerns; equipment; helping company methods; group aid; work-in-progress papers and prototypes.

Show description

Read or Download Advancing the Impact of Design Science: Moving from Theory to Practice: 9th International Conference, DESRIST 2014, Miami, FL, USA, May 22-24, 2014. Proceedings PDF

Similar computer science books

Purely Functional Data Structures

Such a lot books on information constructions think an critical language akin to C or C++. besides the fact that, facts constructions for those languages don't continuously translate good to practical languages equivalent to commonplace ML, Haskell, or Scheme. This ebook describes information buildings from the viewpoint of practical languages, with examples, and offers layout ideas that permit programmers to improve their very own practical information constructions.

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (2nd Edition)

Cyber battle explores the battlefields, individuals and instruments and strategies used in the course of today's electronic conflicts. The recommendations mentioned during this ebook will provide these all for info protection in any respect degrees a greater thought of the way cyber conflicts are conducted now, how they are going to swap sooner or later and the way to observe and guard opposed to espionage, hacktivism, insider threats and non-state actors like equipped criminals and terrorists.

Natural Language Annotation for Machine Learning: A Guide to Corpus-Building for Applications

Create your personal average language education corpus for laptop studying. even if you're operating with English, chinese language, or the other usual language, this hands-on e-book publications you thru a confirmed annotation improvement cycle—the strategy of including metadata for your education corpus to assist ML algorithms paintings extra successfully.

Software Engineering for Resilient Systems: 6th International Workshop, SERENE 2014, Budapest, Hungary, October 15-16, 2014. Proceedings

This e-book constitutes the refereed complaints of the sixth overseas Workshop on software program Engineering for Resilient platforms, SERENE 2014, held in Budapest, Hungary, in October 2014. The eleven revised technical papers awarded including one undertaking paper and one invited speak have been conscientiously reviewed and chosen from 22 submissions.

Additional resources for Advancing the Impact of Design Science: Moving from Theory to Practice: 9th International Conference, DESRIST 2014, Miami, FL, USA, May 22-24, 2014. Proceedings

Example text

Among them, Timmers' approach might be the most popular example [28]. As the business model concept became more widely applied beyond the context of digital businesses, the network-centric perspective has largely 24 S. Turber et al. given way to a firm-centric view conceiving business models as undivided "property of the firm" [27]. Today, as digitization reaches all kinds of business and industries vividly illustrated by the "Nest" example (section 1), we intend to revitalize the network centric view and tie in with early business model research [27, 28].

1. Model of Co-creation of Designer-User Interaction As Figure 1 presents, this model is made up of two different information boundaries. One is designer’s boundary and the other is user’s one. Looking at the boundaries (designer’s and user’s ones), there are two characteristics: (1) design action reflecting on design reflexivity, and (2) design roles by role reflexivity. Thus, each boundary consists of two design actions: discovery and validation. Also, the boundaries have two different roles (original and reversed roles).

20 S. Turber et al. Table 1. Application of DSR for developing the IoT business model artifact [9] Activity Method & Evaluation Method/Stimulus: Real-world BM workshops with companies revealed the difficulty to visualize, develop and analyze business models in IoT driven business environments with extant BM approaches. A1 Outlining the problem situation Evaluation: • BM workshops in various industries, e. g. 0 (8/13), smart city (11/13) etc. • Literature review, review with researchers (IS, Management sciences), interview with practictioners (strategy, C-level) A2 Method: • Review of extant research at the intersection of management sciences, marketing and information systems research • Review of extant business model approaches • Derivation of requirements from theory Analyzing extant research for ideas and definition of solution requirements Evaluation: Cross-check w.

Download PDF sample

Rated 4.11 of 5 – based on 38 votes