Professional Documents
Culture Documents
Research Project SIP Guideline
Research Project SIP Guideline
4
5
Webster and Watson 2002, p XVII
Paper Analysis
Irshad et al (2018)
Synthesizing the Literature
Seidel et al (2013)
All Academic Writing Consists of …
• Context
• Where is this paper coming from
• What are the main issues in this topic
• Gap
• Identifies a hole in the context which this paper attempts to fill
• Research Aim
• States the problem / question that this paper attempts to solve / answer
• What did I do
• What process did I use to solve the problem
• What did I find
• Presents that “data” you collected
• What is the answer
• What answer is suggested by the “data”
• Can I be sure?
• Significance
• Why is it important
• What does the answer mean for business and academics
8
Parts of the Report
Context
Gap
Question
• Abstract What done
What found
Answer Context
Significance Gap
• Introduction Question
What done
What found
Answer Context
• Body Significance Gap
Question
Context
What done Gap
• Conclusion What found Question
• Lacity, MC, Willcocks, LP & Feeny, DF 1995, 'IT outsourcing: maximize flexibility and
control', Harvard Business Review, Vol. 73, No 3, pp. 84-93.
• Citation: (Lacity, Willcocks & Feeny 1995)
or (Lacity et al. 1995)
11
Assessment Criteria
• Critical analysis of the topic:
• completeness, understanding, argument, use of the literature to support
argument (synthesis).
• Flow and structure of the report
• easy to follow, well organised
• Writing style
• grammar, expression, “cleanliness”
• References
• minimum 10 references, reasonable quality (min 5 academic papers), correct
citation, good use of references.
12
Project Plan
• Each group must submit a maximum of 1 page description
(minimum font size: 11 point) containing:
• Title of your research project– be specific and informative
• The gap/problem you want to address in your paper, if possible
with supporting reference(s)
• Detailed structure of your paper (in point forms) – be specific
• Three academic references with:
• Complete reference details formatted using Harvard style
• A brief summary of what each paper is about (+ 50 words)
• A brief explanation on how it is used in your paper (+ 50 words)
• Due date 25 September 2022, 23.55 WIB.
13
References
• Irshad et al (2018). “Effective methods to detect metamorphic
malware: A systematic review”. International Journal of Electronic
Security and Digital Forensics 10(2):138
• Seidel et al (2013). “Sensemaking and Sustainable Practicing:
Functional Affordances of Information Systems in Green
Transformation”. MIS Quarterly vo. 37. No. 4.