Richard Baskerville

Learn More
Action research is an established research method in use in the social and medical sciences since the mid-twentieth century, and has increased in importance for information systems toward the end of the 1990s. Its particular philosophic context is couched in strongly post-positivist assumptions such as idiographic and interpretive research ideals. Action(More)
The concept of generalizability is not homogeneous and monolithic, but can be analyzed into four types: the generalizability of a theory to different settings, the generalizability of a theory within a setting, the generalizability of a measurement or observation, and the generalizability of a variable, construct, or other concept. In this study, we affirm(More)
The security of information systems is a serious issue because computer abuse is increasing. It is important, therefore, that systems analysts and designers develop expertise in methods for specifying information systems security. The characteristics found in three generations of general information system design methods provide a framework for comparing(More)
Building on neo-institutional theory and theories of innovation and diffusion, recent work in the field of management has suggested that management research and practice is characterized by fashions. A management fashion is a relatively transitory belief that a certain management technique leads rational management progress. Using bibliographic research, we(More)
requirements Complete and unambiguous specifications New system projects as achievements Tools/Techniques for emergent ISD goals: Reliable back channels for ISD professionals, emergent IT organizations, prototyping, proper rewards system, and existing tools such as open systems, end-user development and object-oriented designs and implementation tools.(More)
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness in properly securing information assets is the individual user within an organization, much of the focus(More)
Evaluation is a central and essential activity in conducting rigorous Design Science Research (DSR), yet there is surprisingly little guidance about designing the DSR evaluation activity beyond suggesting possible methods that could be used for evaluation. This paper extends the notable exception of the existing framework of Pries-Heje et al [11] to address(More)