EBC8101/EBC8102 – E-Business Research Seminar
Winter 2016
Dr. Peyton is the instructor for EBC8101/EBC8102.
Thursdays 13:00 – 16:00 in LMX 390
– EXCEPT Thursday, January 21, 12:30 – 4:30 in CBY A-04.
See the E-Business Resource Page for resources relevant to the E-Business Program.
There is a Facebook group for all E-Business students to stay connected, that can answer all your questions, keep you up to-date and contact your EBT Student Association.
Please read this article for guidelines on how to work and communicate respectfully with others.
In case of emergency on campus call 4511 for Protection Services … they will call 911 directly if it is needed (911 does not work on campus).
Be safe at night on campus.
There is a free student-run service offered on campus to ensure that no one has to walk to or from class on their own.
Library Resources
Mish Boutet Mish.Boutet@telfer.uottawa.ca is the Telfer Librarian.
Sarah Simpkin is the Librarian responsible for Computer Science on the 3rd floor of Morisset library. x3093 or Sarah.Simpkin@uottawa.ca
Winter 2016 - EBC8102 Schedule
January 14, Liam Peyton, Course Intro and EBusiness PHD Program Overview
Course description and EBusiness Program requirements at:
http://www.grad.uottawa.ca/Default.aspx?tabid=1727&page=SubjectDetails&Kind=H&SubjectId=182
E-Business PHD Comprehensive Exam Form & Process
Thompson, M., & Brubaker, D. (2007). Theses and Dissertations, Second Edition. A Guide to Planning, Research, and Writing. Thousand Oaks: Sage
Jesson, J., Matheson, L. & Lacey. F. (2011). Doing your Literature Review: Traditional and Systematic Techniques. Thousand Oaks: Sage
Mish Boutet Presentation (2015), Library Resources
Papaioannou, D., Sutton, A., Carroll, C., Booth, A., & Wong, R. (2010). Literature searching for social science systematic reviews: consideration of a range of search techniques. Health Information & Libraries Journal, 27(2), 114-122. Permalink to first reading: https://login.proxy.bib.uottawa.ca/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=50353362&site=ehost-live
Effective Literature Searching. (2007). In R. Phelps, K. Fisher, & A. Ellis (Eds.), Organizing and Managing Your Research. (pp. 128-150). London, England: SAGE Publications, Ltd.
Link to second reading: https://login.proxy.bib.uottawa.ca/login?url=http://srmo.sagepub.com/view/organizing-and-managing-your-research/n7.xml
Daniel Amyot Presentation (2015), Systematic Research Reviews, How to publish
A Guide to Conducting a Systematic Literature Review of Information Systems Research
Systematic literature reviews in software engineering – A systematic literature review
http://www.idi.ntnu.no/grupper/su/publ/ebse/meta-systematic-reviews-kitchenham-jan09ist.pdf
Guidelines for performing Systematic Literature Reviews in Software Engineering
Version 2.3; EBSE Technical Report EBSE-2007-01
http://www.elsevier.com/__data/promis_misc/525444systematicreviewsguide.pdf
** January 21, EBusiness Research Workshop, CBY A-04, 12:30 – 4:30 **
January 28, Dan Paré, Communications
February 4, Umar Ruhi, Research Traditions and Approaches
Review this website which provides a good overview of different types of research in Information Systems and also lists some great research articles for further reference.
February 11, Tim Lethbridge, Research Ethics
http://www.pre.ethics.gc.ca/pdf/eng/tcps2/TCPS_2_FINAL_Web.pdf
Tri-Council Policy Statement regarding Ethical Conduct for Research Involving Humans. The focus will be on Chapters 3-5 (pages 27-64).
** February 18, READING WEEK, No class!! **
February 25, Thomas Tran, Recommender Systems
March 3, Miodrag Bolic, RFID Applications in Society
This book gives high-level overview of the technology. Chapters 2-4 are a bit more technical and students do not need to read them carefully. Chapters 5-7 describe applications.
March 10, Bijan Raahemi(13h00), Knowledge Discovery and Data Mining Lab
& Diana Inkpen (14h30), Natural Language Processing for Social Media
Natural Language Processing for Social Media, by Atefeh Farzindar and Diana Inkpen,
Synthesis Lectures on Human Language Technologies, Morgan and Claypool Publishers, August 2015, 166 pages, available at http://www.morganclaypool.com/doi/abs/10.2200/S00659ED1V01Y201508HLT030
March 17, Hussein Al Osman, Affective Computing and Persuasive Technology
Affective computing by Rosalind Picard
http://books.google.ca/books/about/Affective_Computing.html?id=GaVncRTcb1gC
Persuasive Technology: Using Computers to Change what We Think and Do by B. J. Fogg
http://books.google.ca/books/about/Persuasive_Technology.html?id=9nZHbxULMwgC
EBC8102 Presentations
March 24, Student Presentations
Basmah Almoaber, Bhanu Acharya, Ouassila Kherchouche, Alhassan Ohiomah, Ahmad Teymouri, Aneta George
March 31, Student Presentations
Vusal Babashov, Baha Abu-Shaqra, Pilar Mata, Prasidith Gamaarachchige, Arya Rhagozar, Mahdi Ghasemi
April 7, Student Presentations
Channarong Intahchomphoo, Aliaa Alghamdi, Idris Alghazali, Majed Jarrar, Mohamed Galaleldin
FALL 2015 - EBC8101 Schedule
September 10: Liam Peyton, Course Intro and EBusiness PHD Program Overview
Thompson, M., & Brubaker, D. (2007). Theses and Dissertations, Second Edition. A Guide to Planning, Research, and Writing. Thousand Oaks: Sage
Jesson, J., Matheson, L. & Lacey. F. (2011). Doing your Literature Review: Traditional and Systematic Techniques. Thousand Oaks: Sage
Course description and EBusiness Program requirements at:
http://www.grad.uottawa.ca/Default.aspx?tabid=1727&page=SubjectDetails&Kind=H&SubjectId=182
E-Business PHD Comprehensive Exam Form & Process
Mish Boutet, Library Resources
** September 17, EBusiness Research Workshop, SITE 5-084, 12:30 – 4:30 **
September 24, Mish Boutet, Library Resources
Papaioannou, D., Sutton, A., Carroll, C., Booth, A., & Wong, R. (2010). Literature searching for social science systematic reviews: consideration of a range of search techniques. Health Information & Libraries Journal, 27(2), 114-122. Permalink to first reading: https://login.proxy.bib.uottawa.ca/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=50353362&site=ehost-live
Effective Literature Searching. (2007). In R. Phelps, K. Fisher, & A. Ellis (Eds.), Organizing and Managing Your Research. (pp. 128-150). London, England: SAGE Publications, Ltd.
Link to second reading: https://login.proxy.bib.uottawa.ca/login?url=http://srmo.sagepub.com/view/organizing-and-managing-your-research/n7.xml
RefID in RefWorks.
Each reference you import or add to RefWorks is given a unique RefID, starting at 1. When you delete a reference, that reference’s RefID is not reused. If you have duplicate citations in RefWorks, each citation has its own RefID, and when you remove duplicates, one of those RefIDs is removed and, again, not reused. As an example, in my account, I am up to RefID 9983; however, with all of the removal of duplicates and removal of old citations, I currently have about 5000 references in my RefWorks account. If I add two more references, they will be given RefID 9984 and 9985
October 1, Daniel Amyot, Systematic Research Reviews
Guidelines for performing Systematic Literature Reviews in Software Engineering
Version 2.3; EBSE Technical Report EBSE-2007-01
http://www.elsevier.com/__data/promis_misc/525444systematicreviewsguide.pdf
Systematic literature reviews in software engineering – A systematic literature review
http://www.idi.ntnu.no/grupper/su/publ/ebse/meta-systematic-reviews-kitchenham-jan09ist.pdf
A Guide to Conducting a Systematic Literature Review of Information Systems Research
October 8, Yngvar Skar, Håkon Garfors, Jarle Nordvik, West Norway Health Authority and Yngve Lamo, Bergen University
Health Systems and Policy Monitor Website (Norway): http://www.hspm.org/countries/norway08012014/countrypage.aspx
Towards a Multi Metamodelling Approach for Developing Distributed Healthcare Applications
Rukhsana Ahmed, Healthcare Communication
October 15, Liam Peyton, The Criticality of Identity and Transparency in the Design of Internet Applications
P. Mata, A. Baarah, C. Kuziemsky, L. Peyton, An Application Meta-model for Community Care, Procedia Computer Science, Volume 37, Pages 465-472, 2014
http://www.sciencedirect.com/science/article/pii/S1877050914010357
Koch, Michael and Moslein, Katherine, Identities Management for E-Commerce and Collaboration Applications, International Journal of Electronic Commerce 9(3) pp. 11-29, 2005
http://www.jstor.org/stable/27751152
El Emam, Khaled et al, Evaluating Common De-Identification Heuristics for Personal Health Information, Journal of Medical Internet Research 8(4), 2004
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1794009/?report=printable
Google Privacy Policy (in particular DoubleClick, and Information we share)L http://www.google.ca/policies/privacy/
Brain, Marshall. How Internet Cookies Work.: http://www.howstuffworks.com/cookie.htm
Privacy Legislation in Canada: https://www.priv.gc.ca/resource/fs-fi/02_05_d_15_e.asp
PHIPA (Ontario Health Privacy Regulation): http://www.ipc.on.ca/images/resources/hguide-e.pdf
Recommended Book: Zuboff, Shoshana, In the Age of the Smart Machine: The Future of Work and Power, 1989
http://www.amazon.com/In-The-Age-Smart-Machine/dp/0465032117
October 22, Mahmoud Eid, Terrorism and Media Decision-Making
Eid, Mahmoud. (2014). Terroredia: Exchanging terrorism oxygen for media airwaves. In Mahmoud Eid (Ed.), Exchanging terrorism oxygen for media airwaves: The age of Terroredia (pp. 1-12). Hershey, PA: IGI Global.
Eid, Mahmoud. (2010). Cyber-terrorism and ethical journalism: A need for rationalism. International Journal of Technoethics, 1(4), 1-19
** October 29, Reading Week, No Class **
November 5, Jonathan Linton, Research Management
De-babelizing the language of innovation
http://www.journals.elsevier.com/technovation/
November 12, Andre Vellino, Academic Integrity and Citation Analysis
Survey of citation analysis research
http://web.ncf.ca/an386/Documents/1.%20Intellectual-Integrity-Plagiarism-Final.pdf
2014 - 2015
Rocci Luppicini: What is a thesis?
March 5, DAMA Ottawa – Seminar at KPMG, Business Data Transformation Day
http://damaottawa.wildapricot.org/
March 12, Samia Chreim, Socio-cultural factors influencing the use of an electronic incident reporting system
-Noble, D.J., & Pronovost, P.J. 2010. Underreporting of patient safety incidents reduces health care’s ability to quantify and accurately measure harm reduction. Journal of Patient Safety, 6(4): 247-250.
-Hewitt, T., & Chreim, S. 2015. Incident reporting: A comparative study of two hospital divisions. Paper submitted to the Health Care Management Division of the 2015 Academy of Management Conference.
-Barrett, M., Oborn, J., Orlikowski, W.J., & Yates, J. 2012. Reconfiguring boundary relations: Robotic innovations in pharmacy work. Organization Science, 23(5): 1448-1466.
The first reading talks about the barriers to incident reporting. Pay special attention to the fishbone diagram, which summarizes several aspects of the electronic system that may be barriers to reporting. The second reading is a work in progress, but it will show you how two divisions use the incident reporting system differently, although they both belong to the same hospital. The third reading shows how robotic innovations introduced in hospital pharmacies can change the nature of the relationships among practitioners, as well as their skills and status.