Professional Documents
Culture Documents
W23 ClaimsISResearch
W23 ClaimsISResearch
W23 ClaimsISResearch
Ojelanki Ngwenyama1
Ted Rogers School of Business Management
Ryerson University, Canada
Department of Information Systems, Faculty of Commerce
University of Cape Town, South Africa
ojelanki@ryerson.ca
ojelanki.ngwenyama@uct.ac.za
ABSTRACT
The post-truth culture of corporate fraud, scientific misconduct and misinformation is challenging
the legitimacy of our scientific and democratic institutions. The present environment of public
discourse suggest we need highly developed argumentation skills. If we, as scientists and citizens,
are to protect the legitimacy of our democratic institutions, we will need to vigorously interrogate
claims to truth and knowledge. For such discourse, we will need frameworks that signal our
democratic values and enable us to uphold our professional and citizenship commitments to
science and society. This essay is offered as a contribution to the development of frameworks for
open critical discourse in the IS discipline. The framework and approach to the critical
interrogation of scientific claims outlined here are rooted in works of two eminent scholars of
critical discourse and argumentation, Jürgen Habermas and Stephen Toulmin. The approach is
illustrated with an empirical analysis of three papers published in EJIS.
Ojelanki Ngwenyama is a Member of the Academy of Science of South Africa and a Professorial Research Fellow,
1
While many scientists would argue that they implicitly attend to structures of argumentation in
their scientific communications, Rehg (2009) claims that explicit dialogical processes are
necessary for making, defending and assessing the logical cogency of scientific arguments. Pera
(2000) also argues that clear rules and procedures are essential for conducting and adjudicating
scientific discourse. The present climate of strategic manipulation of public discourses with
ambiguous warrants and alternative facts, demands from ethical discussants explicit attention to
structures of argumentation if they are to preserve the legitimacy of institutions of democratic
discourse (Habermas, 2006; Unger 2016).
This essay responds to the need for frameworks and systematic approaches for critically
interrogating the communicative practices of science to unearth and test implied validity claims in
While the writings outlined above have advanced our understanding on the central importance of
argumentation and critical interrogation of scientific claims, they do not give sufficient attention
to structures of argumentation and principles for critical scientific discourse. In advocating for
more critical philosophical inquiry, Rowe (2018) clearly articulated limitations of IS scientific
discourse and its philosophical impoverishment. This essay contributes to filling this perceived
gap by proposing a framework and approach to critical interrogation of validity claims implied in
scientific communications. In line with Rehg’s argument in Cogent Science in Context (CSC),
2. CONCEPTUAL FOUNDATIONS
In Logic of the Social Sciences (Habermas, 1967) and Knowledge and Human Interests (Habermas
1971) Habermas lays out his fundamental ideas on the epistemology of social sciences which he
developed in great detail in later years. Central to his epistemology is the idea that science is an
ongoing critical discourse among a community of engaged scientists who share ethical
responsibility for interrogating and legitimizing all scientific claims proposed by members of the
community. In The Philosophy of Science, (1961) and in later works (Toulmin, 1985, 1999),
Toulmin argues that science is an institutional process comprising norms and shared procedures.
Both Toulmin (1985) and Habermas (1984) agree that a key distinction between scientific and
ordinary discourse is that scientific discourse has “the intention of convincing a universal audience
and gaining general assent (Habermas, 1984; p. 26)”, while ordinary everyday discourse does not
(cf. Toulmin et. al., 1984). Scientific discourse must adhere to a higher standard of critical
interrogation and the testing of implied validity claims. Habermas (1984, cf. p. 26), argues that
such rigor in scientific discourse has three motivations: “(1) the assent of a universal audience; (2)
the attainment of a rationally motivated agreement; and (3) the discursive redemption of validity
In Theory of Communicative Action, Habermas (1984) outlines a model and principles for free and
open scientific discourse. Habermas’ primary interest is the macro level of discourse; he focuses
on the analysis of structural conditions for ethical argumentation and principles for identifying
systematic distortions (strategic manipulation) that undermine free and open critical discourse. His
central concern is providing norms/ideals and conditions to facilitate ethical critical discourse,
I will return to this point later to discuss how Toulmin’s schema is used in Habermasian discourse
analysis for the critical interrogation of claims in scientific discourse and communication.
“arguments that arise in such 'cloudy' cases are not formal or rule-governed, they are
none-the-less full of 'reasons', and open to critical examination. In this respect, they
resemble common law arguments - as involving appeals to precedent - rather than code
law arguments, in which some formal procedure is available for settling the issue”
(Toulmin, 1972).
While the model does provide a common standard and approach for challenging, testing and
redeeming claims in scientific discourses, its application requires contextualizing to the
paradigmatic assumptions of the specific discipline. In Introduction to Reasoning, Toulmin et. al.
(1984) present illustrations of its application to arguments in law, humanities, management,
science and everyday conversation.
10
11
However, while scientists may, in their argumentation, overlook any of these ten validity claims,
they are implied (constitutive of) in the argumentation upon which our scientific knowledge claims
rests, and are redeemable in the scientific discourse. Habermas (1984) argues that being explicit
about the system of validity claims can reduce conflict and the risk of disagreement due to
ambiguity. Furthermore, discourse ethics (Habermas, 2003; Pera, 2000; Rehg, 2009) demand
competent scientists, concerned with achieving mutual understanding within the scientific
community, attend to these claims. Habermas (2003) is clear “the rational acceptability of validity
claims is ultimately based only on reasons that stand up to objections under certain exacting
conditions of communication. If the process of argumentation is to live up to its meaning,
communication in the form of rational discourse must, if possible, allow all relevant information
and explanations to be brought up and weighed so that the stance participants take can be
intrinsically motivated solely by the revisionary power of free-floating reasons” (pp. 108). A
transparent system of validity claims can help to focus the analysis into: “How can problematic
validity claims be supported by good reasons? How can reasons be criticized in turn? What makes
some arguments, and thus some reasons, which are related to validity claims in a certain way,
stronger or weaker than other arguments?” (Habermas, 1984, pp. 24).
12
13
14
In defense of BC3, the researcher should articulate for the scientific community reasons why the
specific theoretical approach/perspective that she has adopted for the inquiry is better than other
options. For example, IS research is multi-paradigmatic (Cushing, 1990; Chen & Hirschheim,
2004; Becker & Niehaves, 2007), encompasses a range of knowledge interest, namely, episteme,
techné and phronesis (Ngwenyama and Klein, 2018) and adopts a variety of methodologies
(Bernroider, et. al., 2013; Davison & Martinsons, 2011). It is important to note here that the term
theoretical approach is inclusive of the various paradigmatic assumptions orienting theory
development in the specific research program. Theoretical approaches/perspectives orient choices
of design theories or principles for design research, models used in positivist theory testing, or
theoretical frameworks used in deductive qualitative research. Theoretical perspectives also orient
the selection of specific logics of empirical analysis in inductive, abductive and retroductive
research (cf. Ngwenyama, 2014). Key questions to be explicated are: Why is the chosen theoretical
approach appropriate for answering the research question about the specific phenomenon? What
does it offer that other theoretical approaches don’t? A defense of BC4 should convince the
scientific community that the researcher has a detailed understanding of the theoretical foundations
(paradigm) of the chosen theoretical approach. What are its important potentials and critical
limitations for the inquiry? In other words, the researcher must demonstrate that she is qualified to
effectively deploy the theoretical approach in a systematic scientific inquiry.
The defense of BC5 must convince the scientific community that methodology chosen by the
researcher is appropriate for: (1) investigating the phenomenon or phenomenal behavior given the
theoretical approach of the research; (2) inquiry into the specific the empirical situation; (3)
15
While a complete defense of BC8 is dependent upon the effective defense of the prior seven basic
claims, there is an important philosophy of science criterion that require explicit attention from the
researcher. The basis for claiming a contribution to knowledge is the principle of inference to the
better explanation (IBE) (Hanson & Toulmin, 1971; Harman, 1965; Thagard, 1978; Day and
Kincaid, 1994). Satisfying the (IBE) criterion requires the author to give a clear and detailed
exposition of how the new explanation of the phenomenon (or aspects thereof) is better than other
explanations available in the existing body of knowledge (Agerfalk, 2014). Explanation is an
inclusive philosophy of science term for all types of theories: descriptive, explanatory, predictive
or normative (prescriptive). Finally, the defense of BC9 and BC10 is largely implicit and indicated
by a clear and comprehensive articulation and defense of BC1 to BC8. Some of the defense of
BC9 might require an explicit response to ethical issues of data collection and use, especially in
social media and big data IS research (Hunter & Evans, 2016; Mauthner, 2018; Light & McGrath,
2010). Furthermore, some of our journals now require explicit acknowledgement concerning
publication ethics (no concurrent journal submissions, etc.). However, as Habermas (1967; 1970,
1993) clearly argues the redeemability of claims requires that members of the scientific community
reading a scientific communication, interrogate and test the validity claims implied or explicit in
the arguments. A competent scientist (or informed citizen) does not passively accept the
16
17
In Stage 2 we are concerned with the claims rebuttal analysis, the objective of which is a vigorous
attempt to refute each of BC1 through BC8 of the research. The focus is on examining: (1) the
validity and strength of the evidence for supporting each claim; (2) the appropriateness of the
warrant as a valid and sufficient basis for analysing the evidence and inferring the claim; (3) the
appropriateness and strength of the backing underlying the warrant. Is the warrant based on solid
background assumptions? While principles of inferential logic can be used as backing for some
warrants, field dependent and paradigmatic assumptions can also serve as backing for warrants.
The objective is to interrogate and judge the appropriateness of the backing for the warrant. The
analysis procedure for this stage involves a systematic examination of the results from Stage 1
using the interrogatives in Table 1. More specifically, each of BC1 through BC8 is analyzed in the
context of the entire discourse and general standards of rational argument (logical consistency,
completeness and defensibility). For a detailed description of general criteria of rational
argumentation, see Toulmin (1958) and Toulmin et. al. (1984). Finally, Stage 3 of the analysis
concerns the interrogation and testing of BC9 and BC10 and judging the sincerity, truthfulness,
legitimacy and comprehensibility of the publication. However, the results from Stage 2 provides a
significant body of evidence upon which the analysis can proceed.
18
Evidence: “Achieving information systems (ISs) integration, a daunting task for any
organization, is especially challenging for small firms” (para. 1, pp. 287).
“Typical SMEs face difficulties during information technology (IT) adoption
arising from a lack of technical competency and know-how, shortages of
qualified human resources….. (para. 1, pp. 287).”
Warrant: “Although some literature exists on ERP adoption (Buonanno et al, 2005),
SME-specific IS architectural surveys are virtually non-existent” (pp. 298).
In articulating their research questions, they are careful to qualify the focus (set boundary
conditions) of their investigation to IS architectures in SMEs. They provide evidence in defense
of BC1, the relevance and persistence of their questions in paragraph 1 of their introduction, citing
seven other published works in support of their argument. They argue that their study is warranted
because of the absence of IS architecture studies in the empirical situation of SMEs. In the first
half of paragraph 2, they further argue for the economic relevance of their study to SMEs and
society, citing several other published works. In the second half of the same paragraph, they state
why answers to their questions are of value in extending our body of knowledge and are of
relevance to improving efficiency and effectiveness in IS integration in SMEs. The authors do not
explicitly provide a warrant for the economic relevance argument they offer, but the ‘theory of the
efficient firm (Marschak, 1960)’, is implied in their reasoning:
19
With regard to BC2, the authors provide an extensive exposition of prior research on IS
architecture and systems integration as evidenced by their citations of key references. Furthermore,
they cite authoritative sources (including the IEEE standard 1471-2000) to define the phenomenon
and provide a table (Table 2) outlining the various aspects of the phenomenon relevant to their
study. The implied warrant for BC2 is ‘completeness’; the comprehensiveness of their exposition
is demonstrative of their command of the literature on IS architecture.
BC3: In stating their research question on page 288, column 2, the authors claim an exploratory
inductive approach for the inquiry. In defense of BC3 the authors provide the following evidence
and warrant:
Evidence: “Although some literature exists on ERP adoption (Buonanno et al, 2005), SME
specific IS architectural surveys are virtually non-existent. And, since much of the current
literature examines IS integration through the lens of the large-scale enterprise, it is
unclear whether these findings generalize well to the SME.”
Given that the authors have chosen an exploratory inductive approach to their research the defense
of BC4 and BC5 can be dealt with together. This is because a defensible execution of exploratory
inductive approach depends on the chosen methodology. The authors chose to use an exploratory
questionnaire and cluster analysis techniques for their research methodology. In their research
method section, the authors argue their claim by providing evidence and a warrant as follows:
Claim: “the research involved an exploratory questionnaire from which was conducted a
kind of cluster analysis, [Evidence]...typically used to describe firms as configurations in
a holistic way (Aldenferder & Blashfield, 1984)”.
20
BC6: The reader will recall that, in their research questions, the authors stipulated SMEs as the
empirical situation for their study. On examining BC6, we find that the authors use the French
classification scheme which defines SMEs by the number of employees (10 to 3000). They then
present evidence in Table 4 (pp. 294) demonstrating that the distribution of 143 firms in their
sample met the criteria for the French SME classification of 10 to 3000 employees. The
interrogation of the authors defense of BC7 reveals that in the section ‘Data collection…’ they
21
With regard to BC8, a requirement of our interrogation requires that we apply the IBE criterion.
The authors are expected to explicitly outline the evidence in support of the claim that their new
explanation is better than that which currently exists. In the context of the present research, the
authors argued that no studies of IS architectures in SMEs existed, therefore, no empirically
grounded knowledge of the phenomenon existed in the IS literature. The assent of this claim
constitutes a benchmark against which we can apply the IBE criterion to assess their claim that
their findings constitute a contribution to knowledge. A second criterion we must apply in this
evaluation is the knowledge interest (descriptive, explanatory, predictive, or prescriptive) they
claim for their research findings. In explication of BC1, the authors claimed two research questions
with descriptive knowledge interest:
RQ1: What are the main IS architectures found in SMEs?
RQ2: What kinds of systems integration approaches are present in SMEs?”
Furthermore, in the abstract and research method section, the authors made some important claims
about the knowledge interest of their contribution which we are also obliged to test in evaluating
BC8: In the abstract (BC8.1, BC8.2) and research method section (BC8.3) they clarify the
knowledge interests of their research as follows:
BC8.2: “The contribution of this paper lies not in the identification of the three types but
resides (1) in the description of their distribution in SMEs; (2) in the absence of other
integration/ interoperability types in this population; and (3) most importantly in the
interpretation of the organizational and historical rationale explaining the emergence of
these types in this organizational context.”
BC8.3: “We see this research as contributing to the description of the artifacts and to
furthering the development of taxonomies by which we can establish standardized
terminology and later a theory of those artifacts and their ecosystems (Star & Ruhleder,
1996).”
22
Warrant: “Having examined how these architectural and systems integration forms arise
in the SME and not the domain of the large-scale enterprise allowed us to propose that the
typologies arising from studies of large firms are not universally applicable to all firms.
In the process, we believe that we have also contributed to theory development via a
clarification of nomenclature definitional confusion around the term ‘IS architecture’ and
of the many different definitions related to the ‘architectural’ construct.”
Finally, we arrive at the interrogation of qualifiers to the knowledge claim that the authors make.
Starting in paragraph 2 of the conclusion, the author’s state and discuss four qualifiers of their
research. The qualifiers are itemized below, see paragraphs 2, 3, and 4 on page 299 for detailed
discussion:
Qualifier 1: “First, surveys on enterprise integration architectures are rare, particularly
in the arena of the SMEs. Therefore, as a first stab at describing and understanding IS
architectures and systems integration typologies in the SME, we had to adjust to surprises
encountered at each step of the process.”
Qualifier 2: “Second, this is the first study of this type examining French firms. It has been
9 years since our initial study, and despite other work in this domain we find that some of
the items that we tested have not been asked in follow-on surveys.”
23
Qualifier 4: “And fourth, there are suggestions that BI (business intelligence), web
services (Puschman & Alt, 2005), cloud computing and ‘The Grid’ may be making inroads
even into the domain of the SME.”
As stated earlier, BC9 and BC10 are assessed based on the corpus of the evidence compiled in
interrogating BC1 through BC8. If those claims are ‘redeemed’, i.e., have not been refuted by our
critical interrogation, then in the main BC9 and BC10 are also redeemed, and the work gains assent
as sincere, truthful, comprehensible, and legitimate scientific communication. However, if future
interrogation should undermine the claims, then its assent will be withdrawn.
Warrant: “The mobility of these devices and their multiple contexts of use add several
dimensions to the user satisfaction and organizational adoption problem.”
24
Claim: “At present, there is, however, no explicit approach for studying these within the
current conceptualization of user satisfaction.”
BC8: Once again, in testing the validity of BC8 we are required to apply the IBE criterion. The
authors (Scheepers at. al., 2006) are expected to clearly and explicitly defend the claim that their
new explanation is better than currently existing theories in the user satisfaction literature. The
benchmark for this analysis is the assent of authors’ argument in defense of BC3 (outlined above).
In the section ‘User satisfaction in organizational contexts,’ the authors mount a defense for BC2.
In their defense, they summarize the key aspects of the user satisfaction literature relevant to their
research. They present a carefully argued review of the core concepts of user satisfaction and
technology acceptance theories, outlining their historical development and limit of focus on the
organizational context. With these issues in mind, the authors’ state their explanatory knowledge
interest as follows:
“we question how individuals’ satisfaction with mobile computing is influenced by the
multiple contexts of use afforded by these devices”
They propose extending the contexts of current user acceptance theories to encompass other
contexts, the professional and individual, and two new voluntary use situations. In Figure 1 on
25
Evidence: “Our findings show that in the case of mobile computing (even in mandatory
use scenarios), user satisfaction is judged by users on more than the use of the technology
within the organizational context.”
“Our results show that the varying social contexts of individual use (individual as
employee, professional, private user, and as member of society) result in different social
influences that can affect the individual’s perceptions of user satisfaction with the
technology.”
“we find that influences pertaining to the organizational context, society-at-large, the
profession, and private context all contribute to users’ overall satisfaction with mobile
computing.”
“We argue that as IT becomes more ubiquitous, it will increasingly be necessary to take
extra-organizational contexts into account when assessing users’ satisfaction, even in
situations of mandatory use in the organization.”
Qualifier 1: “First, the mobile computing devices in this study hold the potential for
extended use. This limits the practical implications of this research in terms of application
context because some mobile technologies do not typically offer the option of use outside
the organizational context.”
Qualifier 2: “Second, the two cases incorporate influences that pertain to healthcare
professionals. Further research is needed to assess extra-organizational influences on the
perceptions of individuals toward mobile technologies in other sectors.”
As stated earlier, the analysis of this paper is focused on BC1, BC3 and BC8 with the intention of
drawing a contrast to the analysis of the Bidan et. al., (2012) paper. I wanted to draw the reader’s
attention to stylistic differences in articulating research questions, arguing for the theoretical
26
5. Conclusion
This essay responds to calls for systematic approaches to scientific discourse and communications
from the general community of scientists (Ferrell & Old, 2016; Wittek, et. al., 2017), and for ethical
and rigorous critical discourse as part of knowledge legitimation practices by IS scholars (Stahl,
2009; Mingers and Walsham, 2010; Truex et. al., 2018). Contemporary challenges of the ‘post-
truth era’ demand that academics invest in the ‘science of scientific communication’ as a bulwark
against distortions in scientific discourse (Nisbet, 2017; Angermuller, 2018). The centrality of
critical discourse to scientific knowledge production cannot be overstated. As Pera (2000, pp. 63)
argues, “if there is no other accessible way of getting in touch with nature except by putting
forward hypotheses, testing them against empirical evidence, and discussing them in front of a
community……. then rhetoric is no mere a device, but rather the tool of the very constitution of
scientific knowledge”. Recently, Rowe (2018) argued that the IS community has an obligation to
cultivate more open philosophical discourses on the science of IS and its social implications. And
while the IS discipline has deep roots and continued investments in the application language and
communication theory to studying IS phenomena (Goldkuhl and Lyytinen, 1982; Lyytinen, 1985;
Lyytinen and Klein, 1985; Ngwenyama and Lee, 1997; Ågerfalk and Eriksson, 2004; Te'eni,
2006), not much attention has focused on building frameworks for the systematic analysis of our
scientific discourses. The essay responds to this gap by proposing a framework and approach for
identifying and interrogating implied validity claims in IS scientific discourse. The approach is
based on principles of Habermasian critical discourse and Toulminian argumentation which are
concerned with how we can emancipate ourselves from systematically distorted communication.
The framework and approach offers the following important contributions to the analysis and
legitimation of IS scientific claims: (1) A system of ten interlocking basic claims explicating the
conditions for the validity of a core set of arguments that IS researchers must make and defend
concerning the principal decisions involved in conducting and communicating their research.
27
28
References
Ågerfalk, P. J. (2013). Embracing diversity through mixed methods research. European Journal
of Information Systems, 22(3), 251-256.
Ågerfalk, P. J. (2014). Insufficient theoretical contribution: a conclusive rationale for rejection.
European Journal of Information Systems, 23(6), 593-599.
Ågerfalk, P. J., & Eriksson, O. (2004). Action-oriented conceptual modelling. European Journal
of Information Systems, 13(1), 80-92.
Allcott, H., & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of
Economic Perspectives, 31(2), 211-236.
Angermuller, J. (2018). Truth after post-truth: for a Strong Programme in Discourse Studies.
Palgrave Communications, 4(1), 30.
29
30
31
32
33
34
35
BC1: Is the question that the researcher proposes to investigate relevant and persisting in the field
of study?
The authors explicitly state a research question and provide evidence and warrants for its relevance
and persistence:
Claim: “we investigate whether knowledge for conceptual design of enterprise integration
solutions, which is rarely codified, can, in fact, be accessed and reused; and
whether such reuse contributes to more effective design outcomes. (pp.519, para,
1, ln. 3)”
Evidence: “The design of large and complex enterprise integration solutions is a difficult
task. It can require solutions that are unique because of constraints from the
current set of legacy applications. Design knowledge for enterprise integration
solutions is, therefore, difficult to articulate and reuse. In particular, the nature
and form of knowledge for conceptual design of integration solutions is difficult
to pin down” (pp. 518, ln 1, abstract).
Backing: None
BC2: Has the researcher demonstrated a command of the literature of the field of study in which
she is attempting to contribute? No! The authors research is in the area of the language action
approach to modeling, but they don’t seem to have sufficient knowledge of the body of work in
this area that goes back to 1982. They cite only three papers Lind & Goldkuhl, 2001; Moore, 2001;
Goldkuhl & Agerfalk, 2000.
In the section: Designing enterprise integration solutions, the authors briefly discuss Business
Process Models and tools used for modeling and understanding integration requirements. Again,
the discussion is narrowly focused with scant evidence (8 citations) of a command of the literature:
Claim: “Integration requirements are often represented in the form of Business Process
Models (BPMs) (Aalst et al.,2003b), which embody a control-flow perspective
(WfMCTerminology,1999). They represent different tasks that must be performed,
and actors such as individuals and legacy systems that perform these tasks. The
36
Evidence: “Aalst et al., 2003a; Aalst et al.,2003b; Zhu et al., 2004 Popkin, 2005; Ouyang
et al., 2007; Lam, 2005; Hohpe &Woolf, 2004; Banavar et al., 1999”
Warrant: None.
Backing: None.
BC3: Is the theoretical approach/perspective that the researcher has selected for the inquiry is
appropriate for investigating the research question?
In the section: Knowledge reuse for designing enterprise integration solutions, the authors claim
Speech Act Theory and Action Types as their theoretical approach and provide limited evidence
and warrants (Lind & Goldkuhl, 2001; Moore, 2001; Goldkuhl & Agerfalk, 2000) for their
appropriateness. They also presented a model (Figure 1) illustrating how speech acts can be used
to map actions to patterns of design knowledge. And in Figure 2 the authors illustrate how
enterprise integration patterns can be modeled using speech acts.
Claim: “we have argued for the appropriateness of speech acts as an effective mediator
for this purpose”. (pp.520, para, 2, ln. 2)”
“we utilize action types that reflect the performers’ intent for performing the task.
These action types correspond to high-level business actions that the actor
performs through means of communication directed toward other actor(s).
Evidence: “Speech acts distinguish between illocutionary acts (actions performed by the
speaker) and perlocutionary acts (intended effects on the hearer). They
represent a bridge between the two perspectives because they can be (a) mapped
against control-flows (with their focus on sequences of tasks) as well as (b) used
to augment messaging primitives with semantic content”. (pp.520, para, 2, ln.
4)
Warrant: “We build our argument on the premise suggested by speech act theory (Searle,
1969) that language can be used not only as a signification of a situation or
fact, but also to perform action (Goldkuhl & Agerfalk, 2000).” (pp.520, para,
2, ln. 3).
Lind & Goldkuhl, 2001; Moore, 2001;
37
BC4: Has the researcher demonstrated a command of the paradigmatic assumptions upon which
the theoretical approach/perspective of research is based? NO! The authors claim Speech Act
Theory and Action Types for their theoretical approach/perspective but do not discuss these
theories or their paradigmatic assumptions.
BC5: Is the methodology that the researcher has selected appropriate for investigating the research
question given the theoretical approach? The authors claim design science as their methodology,
but do not discuss the appropriateness of design science to their research question. The design
science methodology has two phases: (1) prototype development; and (2) prototype evaluation.
Claim: “The research follows design science guidelines in which we describe a research
artifact, and evaluate it to assess whether it meets the intended goals (pp.518,
abstract, ln. 4)”
Evidence: “The design artifact we have developed to facilitate this assistance to the
designer includes a knowledge base (Sowa, 2000) that captures relationships
and constraints among concepts such as task, action types, speech acts, and EI
Patterns” (pp. 521, para 3).
“Design science principles suggest that theoretical constructs embodied in the
artifact should be evaluated to demonstrate the appropriateness and utility of
their usage (Hevner et al., 2004). In our case, this means that effectiveness of
the use of speech acts to access and reuse conceptual design knowledge (i.e.,
EIP) should be evaluated. Toward this end, we compared integration solutions
obtained with the aid of speech acts against those obtained without the aid of
speech acts (Eickelmann & Richardson, 1996) following a controlled
experimentation strategy (Shadish et al., 2001) (pp. 522, para 1)”.
Warrant: Carlsson, 2006; Heavner, et al, 2004; Johannesson and Perjons, 2001;
Eickelmann & Richardson, 1996; Shadish et al., 2001.
Backing: None
BC6: Is the empirical situation selected for the inquiry is appropriate for observing the
phenomenon or phenomenal behavior that the researcher is investigating? Yes! The researchers
used a randomized experiment with student subjects from a course to test their hypothesis that:
design solutions produced by Speech Act based support will have fewer errors than those
produced with Speech act based support
38
Evidence: “The subjects were recruited from a pool of students enrolled in an ‘Advanced
Enterprise Integration’ course (second in a two-course sequence), which
provides deep understanding of integration techniques across multiple
application settings. (pp.522, para 5)”
BC7: Has the methodology been applied in a systematic manner and carefully documented to
allow for replication or corroboration by other researchers? The authors provide a detailed
discussion of how the applied the principles of design science in their research.
Claim: “Design science principles suggest that theoretical constructs embodied in the
artifact should be evaluated to demonstrate the appropriateness and utility of
their usage…
In our case, this means that effectiveness of the use of speech acts to access and
reuse conceptual design knowledge (i.e., EIP) should be evaluated.
The evidence for this would be provided by the relative effectiveness of integration
solutions (pp.518, abstract, ln. 4)”
Evidence: “Our approach to facilitate reuse of design knowledge related for conceptual
design of enterprise integration solutions uses the mapping described above
(and shown in Figure 1).
Integration requirements are described in BPMN models that capture the
logical execution of tasks along with the performer of each task…..
To further reduce the search space (and sometimes to identify the one
appropriate pattern), we utilize action types that reflect the performers’ intent
for performing the task….”
Warrant: Carlsson, 2006; Heavner, et al, 2004; Johannesson and Perjons, 2001; Lind &
Goldkuhl, 2001; Tvedt & Collofello, 1995
Backing: None
39
Claim: “This paper provides a rationale for using a speech acts-based mechanism for
accessing and selecting appropriate integration patterns, followed by an
assessment of the mechanism based on a controlled experiment for which two
different versions of the research prototype were used” (pp. 525, para 5).
Evidence: “Our analysis involved two-sample t-tests on the data gathered to test the
hypothesis that the solutions produced using the research prototype with speech
acts contains fewer design errors than the research prototype without speech
acts. (pp.525, Para 3)”
In Table 4 the authors present the significant results of t tests comparing the
evaluation of the prototype use (analysis of error rates) in modeling the solution
with and without the speech act mechanism
Warrant: For the evaluation; Central Limit Theorem of Statistics (expected random
normal distribution of errors).
Backing: None
BC9: The research has been conducted in an ethical manner: respondent autonomy and
confidentiality is maintained; ethical data collection protocols are observed; no part of the work
has been plagiarized and all sources have been acknowledged. Yes! The authors describe their
data collection protocols.
BC10: Does the paper reflect communicative competence: it is carefully argued and written in a
manner that is understandable to the scientific community? No! The paper fails, there are gaps in
the argumentation that undermine the quality of the research communication. The authors fail to
defend BC2 and BC4, and offers a weak defense of BC3. Furthermore, the lack of attention to
BC2 makes it difficult to assess the contribution to the field.
40