Ken Peffers

Ken Peffers
University of Nevada, Las Vegas | UNLV · Department of Management, Entrepreneurship and Technology

Doctor of Philosophy

About

54
Publications
168,815
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12,286
Citations

Publications

Publications (54)
Preprint
Full-text available
The authors design and demonstrate a process for carrying out design science (DS) research in information systems and demonstrate use of the process to conduct research in two case studies. Several IS researchers have pioneered the acceptance of DS research in IS, but in the last 15 years little DS research has been done within the discipline. The...
Conference Paper
Full-text available
Designs a modular framework for structuring design theory in design science research. Demonstrates the framework in the structure of a design theory for the market segmentation of customers in a firm's internal market for IT help by the firm's internal IT unit.
Article
Full-text available
We use social science theories, design science research methodology (DSRM), and our experience in five development projects to design principles for selecting or adapting requirements acquisition (RA) techniques for use with populations of customers and users. The information systems (IS) literature has not systematically focused on the adaption of...
Article
We propose the definition of genres in IS design science research (DSR). In recent years DSR has become a well-accepted research paradigm within IS; however, now the diversity of purpose, methodology, and mental models has increased to a point where reviewers and editors are unsure about which standards to apply to particular research submissions....
Conference Paper
The current study aims to improve the requirements engineering (RE) communication, as often times projects fail due to poorly specified or misunderstood requirements. We use design science methods to build and evaluate a conceptual model which can add value to managers by offering them a set of guidelines and best practices for facilitating the RE...
Conference Paper
We are developing a semi-formal business process modeling notation based on the modification of theatrical blocking notation that is more cognitively effective for application in requirements engineering communication than extant notations. The Socio-Technical System Notation (STSN) incorporates ontological, semantic, and visual design improvements...
Article
This article reviews IT funding and system justification practice and research in two dimensions, previews papers in the special issue on ‘Information technology funding and system justification in the organization’, and identifies opportunities for research in IT funding. IT funding decisions have been hard problems for firms and, because IT inves...
Conference Paper
Current proposals for combining action research and design science start with a concrete problem in an organization, then apply an artifact to improve the problem, and finally reflect on lessons learned. The aim of these combinations is to reduce the tension between relevance and rigor. This paper proposes another way of using action research in de...
Conference Paper
Full-text available
The consensus view is that the rigorous evaluation of design science (DS) artifacts is essential. There are many types of DS artifacts and many forms of evaluation; what is missing is guidance for how to perform the evaluation, more specifically, what evaluation methods to use with specific DS research outputs. Here we find and review 148 DS resear...
Book
This book constitutes the refereed proceedings of the 7th International Conference on Design Science Research in Information Systems and Technology, DERIST 2012, held in Las Vegas, NV, USA, in May 2012. The 24 revised full papers presented together with 7 revised short papers were carefully reviewed and selected from 44 submissions. The papers are...
Conference Paper
Full-text available
This research explores the decision-making process of expert estimators of corrective maintenance projects by using qualitative methods to identify the factors that they use in deriving estimates. We implement a technique called causal mapping, which allows us to identify the cognitive links between the information that estimators use, and the esti...
Article
Full-text available
A major challenge in service design is the ability to generate useful service concepts for development. New service concepts, however, are often difficult for customers to articulate. In this study we address the idea generation stage of the service development process and suggest the integration of customer scripts to facilitate service concept di...
Conference Paper
This paper motivates, designs and demonstrates a method for requirements engineering (RE) with blind users. We motivate the need for the method by pointing out that, although much has been done to accommodate blind users’ accessibility to systems, little formal research has addressed the need to include members of this large and growing population...
Article
Critical success factors (CSF) is a useful concept to identify performance objectives to be satisfied by new strategic IT investments, but it suffers from limitations that affect its value. It lacks a theoretical basis, there is no accepted procedure for its implementation, and ad hoc implementations may result in incomplete and biased results.
Article
Full-text available
The paper motivates, presents, demonstrates in use, and evaluates a methodology for conducting design science (DS) research in information systems (IS). DS is of importance in a discipline oriented to the creation of successful artifacts. Several researchers have pioneered DS research in IS, yet over the past 15 years, little DS research has been d...
Article
Full-text available
ABSTRACT This chapter identifies seven problems,associated with requirements,elicitation where the intended users are external to the firm, proposescharacteristics for requirements elicitation methods to resolve the problems, and tells the story of a new method that supports resolution of six of the seven problems. Diverse, external users, with lit...
Chapter
This chapter identifies seven problems associated with requirements elicitation, where the intended users are external to the firm; it proposes characteristics for requirements elicitation methods to resolve the problems and tells the story of a new method that supports the resolution of six of the seven problems. Diverse, external users with littl...
Chapter
This chapter identifies seven problems associated with requirements elicitation, where the intended users are external to the firm; it proposes characteristics for requirements elicitation methods to resolve the problems and tells the story of a new method that supports the resolution of six of the seven problems. Diverse, external users with littl...
Conference Paper
Full-text available
This paper presents the design of blind user requirements engineering (BURE). It extends wide audience requirements engineering (WARE), a method for data collection, analysis, and presentation of system requirements for users; who are widely dispersed and may have little connection to the organization or technology and little motivation to particip...
Article
Full-text available
The paper motivates, presents, demonstrates in use, and evaluates a methodology for conducting design science (DS) research in information systems (IS). DS is of importance in a discipline oriented to the creation of successful artifacts. Several researchers have pioneered DS research in IS, yet over the past 15 years, little DS research has been d...
Article
Full-text available
The authors design and demonstrate a process for carrying out design science (DS) research in information systems and demonstrate use of the process to conduct re- search in two case studies. Several IS researchers have pioneered the acceptance of DS research in IS, but in the last 15 years little DS research has been done within the discipline. Th...
Article
Full-text available
Here we explore the terrain of understanding the value of IT applications for diverse users across cultures. The domain of our investigation is the development of features for applications that make use of presence and location information about the user. There is good reason to believe that such applications might create substantial value for mobi...
Article
We use information theory to justify use of a method to help managers better understand what new IT applications and features will be most valued by users and why and then apply this method in a case study involving the development of financial service applications for mobile devices. We review five methods for data gathering, analysis, modeling, a...
Chapter
This chapter identifies seven problems associated with requirements elicitation, where the intended users are external to the firm; it proposes characteristics for requirements elicitation methods to resolve the problems and tells the story of a new method that supports the resolution of six of the seven problems. Diverse, external users with littl...
Article
We extend critical success factors (CSF) methodology to facilitate participation by many people within and around the organization for information systems (IS) planning. The resulting new methodology, called "critical success chains" (CSC), extends CSF to explicitly model the relationships between IS attributes, CSF, and organizational goals. Its u...
Article
CIOs manage the intensely competitive requests originating from throughout their organizations for increasingly constrained system development resources. At the strategic level, an organization needs new systems that create competitive advantage by adding value to products, reducing costs, or opening new marketing channels. At the tactical and oper...
Article
Evaluating investments in information technology (IT) is very important for senior managers in the financial services industry, but is problematic because the direct benefits of such investments are difficult to link to organizational goals. Performance impacts are often difficult to quantify, either as expected benefits of proposed investments or...
Article
Here we investigate the relationship between the use of geographic and information technology (IT) scope as complementary factors to affect the value of products, the cost of operations and the overall performance of firms. We introduce the IT/Geographic Scope Matrix (IGSM) as a framework with which to study and understand the relationship in order...
Conference Paper
Full-text available
The CIO faces competing demands from internal customers for a variety of services, such as consulting, development, maintenance, and operations. S/he is also responsible for identifying new projects that will increase firm value. How can s/he identify potentially high-impact projects in the face of a deluge of requests, many for politically motivat...
Article
The rapid growth of the Internet over the past 5 years has greatly increased interest in its potential use of the Internet for electronic commerce (EC), particularly as a vehicle for transactions between customers and suppliers. Today, Internet-based EC applications are in their infancy and investments in innovative information technology (IT) appl...
Article
Information system (IS) research suggests that the use of innovative information technology (IT), deployed globally with the right mix of organizational assets, may help firm performance by increasing scale and scope economies, customer value, operational efficiency and organizational effectiveness, and by providing opportunities for competitive ad...
Article
Here we investigate the evaluation of information technology (IT) projects to determine when firms evaluate IT and what the effects are on decisions made about the projects. We study evaluation over the IT project life cycle among a sample of the largest firms in Finland from a variety of industries. We also investigate the use of procedures that a...
Article
In this study we report on the experience of six firms that adopted electronic data interchange (EDI). The firms are from three industrial (manufacturing, health care, and retailing) in two countries (US and Germany) and they include large and medium sized firms. Their EDI implementations span nearly 20 years. We examine their motivation and expect...
Article
There is evidence to indicate that the effects of new product and service innovations change over time as a result of learning and competition. However, there have not been any studies of the effects of learning and competition on the impacts of innovative information technology (IT) applications. This paper presents the results of an extensive stu...
Article
This manuscript provides an innovative and timely examination of an issue which has perplexed holars and managers interested in the application of information technology, ''Can it be shown that investments in information technology improve an organization's financial performance?'' as well as an issue which has interested researchers and managers i...
Article
Full-text available
Determining whether investments in information technology (IT) have an impact on firm performance has been and continues to be a major problem for information systems researchers and practitioners. Financial theory suggests that managers should make investment decisions that maximize the value of the firm. Using event-study methodology, we provide...
Article
The impact of information technology (IT) on firm performance has been repeatedly asserted and is now widely accepted. Firms have found opportunities to use IT in products and processes to reduce costs and increase product value, as well as to affect organizational effectiveness, through improved coordination, communication and control. It is claim...
Article
This book examines the use of structured and unstructured induction to design rule-based expert systems in situations which may be too complex to be coded using conventional techniques. It aims to offer a solution to the problem that the complexity of expert systems is limited by the inherent difficulty of converting the knowledge possessed by the...
Article
The growth of electronic commerce (EC) may be impeded because payment systems (PS) designed for offline commerce have been adapted for online use, but without all of the information contained in physical meetings among transaction parties. Resulting problems add costs to transactions and affect profitability for EC transactions. New PS have been de...
Article
Full-text available
Abstract This study presents a new method,to effectively determine requirements for information systems involving widely dispersed end users, such as customers, suppliers, business partners, and other end-users outside the organization, and demonstrates the efficacy of the method,in a case study. Recently more IS have been targeted towards users ou...
Article
Full-text available
The study focuses on understanding how consumers perceive a new mobile service: presence. Presence extends the messaging capabilities of consumers and service providers alike. In simple terms, it enables communication of your current availability and interest levels to other users. In this study, we used wide audience requirements elicitation (WARE...
Article
Submission and review process objectives • To select papers for publication that are novel, state-of-the-art, and exciting, that IS researchers and professionals will want to read, and that will have an impact on research and/or professional practice in IS. • To publish papers very quickly with an engineered review and publication process designed...

Network

Cited By