Cookie Preferences

We use cookies to enhance your browsing experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. See our Privacy Policy for more information.

A-DSRM

MethodologyValidatedCaseStudyWhite Paper
AI SecurityResearch MethodologyGovernanceCybersecurity

Agile-Infused Design Science Research Methodology (A-DSRM) is a principled extension of canonical DSRM that embeds continuous validity preservation through iterative Define-Design-Demonstrate-Evaluate-Refine cycles. A-DSRM explicitly treats adversarial adaptation as a first-class research variable, transforming DSRM from a project-bound methodology to a living governance framework.

Jovita T. Nsoh, Ph.D.

Department of Information & Logistics Technology, Cullen College of Engineering, University of Houston

DSRM Lifecycle Coverage

Artifact Overview

Problem

Design Science Research Methodology (DSRM) has emerged as the dominant paradigm for artifact construction in information systems, yet its canonical single-pass evaluation model proves insufficient for AI systems operating in adversarial, continuously evolving environments. Three core limitations exist: (1) static problem framing, (2) one-time evaluation bias, and (3) governance-action decoupling.

Operational Context

Methodology researchers, DSR community, AI governance scholars, and practitioners building security artifacts for adversarial environments.

Evaluation

CaseStudy4 metrics

Key Contributions

1

First systematic review of DSRM adaptations for adversarial systems

2

Formal drift-aware DSRM extension with provable validity preservation properties

3

Cross-domain validation establishing generalizability beyond cybersecurity

Paper Structure

Section 1

The Adversarial DSRM Challenge

Section 2

Systematic Review Methodology

Section 3

Taxonomy of DSRM Adaptations

Section 4

Gap Analysis: Missing Drift Management

Section 5

A-DSRM Formal Specification

Section 6

Case Study Validation

Classical DSRM (linear with optional iteration) versus A-DSRM (cyclical with integrated problem evolution φ).

Classical DSRM (linear with optional iteration) versus A-DSRM (cyclical with integrated problem evolution φ).

1. Problem Statement & Operational Motivation

Design Science Research Methodology (DSRM) has emerged as the dominant paradigm for artifact construction in information systems, yet its canonical single-pass evaluation model proves insufficient for AI systems operating in adversarial, continuously evolving environments. Three core limitations exist: (1) static problem framing, (2) one-time evaluation bias, and (3) governance-action decoupling.

This problem arises in the context of methodology researchers, dsr community, ai governance scholars, and practitioners building security artifacts for adversarial environments. and reflects constraints commonly encountered in production systems, including scale, adversarial behavior, regulatory requirements, and operational continuity.

2. Artifact Description

Agile-Infused Design Science Research Methodology (A-DSRM) is a principled extension of canonical DSRM that embeds continuous validity preservation through iterative Define-Design-Demonstrate-Evaluate-Refine cycles. A-DSRM explicitly treats adversarial adaptation as a first-class research variable, transforming DSRM from a project-bound methodology to a living governance framework.

The artifact is designed to be identity-first, treating authentication, authorization, federation, and policy enforcement as the primary control plane. It is intended to function under real operational conditions rather than idealized assumptions.

3. Design Science Research Methodology (DSRM) Mapping

A-DSRM follows DSRM with research contributions expressed as an operational artifact.

• Problem Identification & Motivation

The operational problem was defined based on observed risks and limitations in existing systems.

• Design & Development

A-DSRM is built on the following design principles:

  • Continuous validity preservation through iterative cycles
  • Adversarial adaptation as a first-class research variable
  • Drift-detection mechanisms embedded in methodology
  • Transformation from project-bound to living governance framework

• Build

A-DSRM comprises a formal process model with drift-detection mechanisms, a taxonomy of DSRM adaptations for dynamic environments, and validation protocols for adversarial contexts. The methodology defines five phases: Identify, Design, Build, Evaluate, and Refine—with explicit iteration requirements.

• Demonstration

Validated through three longitudinal case studies spanning AI-powered intrusion detection systems, autonomous vehicle security protocols, and smart grid defense architectures.

• Evaluation

Findings demonstrate that A-DSRM reduces risk validity decay by 68% compared to traditional DSRM implementations in adversarial contexts, with validation across three distinct critical infrastructure domains.

• Communication

The artifact is documented as a citable protocol object and connected to research notes, simulation plans, and deployment guidance.

4. Evaluation & Evidence

Evaluation Method: CaseStudy

Evaluation Metrics:

  • Risk validity decay reduction (68% improvement vs traditional DSRM)
  • Cross-domain generalizability
  • Practitioner adoption metrics
  • Reproducibility scores

Evaluation Contexts:

  • Systematic review of 127 DSRM adaptations across cybersecurity, AI safety, and critical infrastructure
  • Longitudinal case studies in AI-powered intrusion detection
  • Autonomous vehicle security validation
  • Smart grid defense evaluation

The evaluation approach treats the environment as adversarial and constrained. A-DSRM is not assessed on theoretical correctness alone; it is assessed on whether it can deliver trustworthy behavior under realistic deployment assumptions.

5. Key Citations & Foundations

  • Peffers et al. (2007) - Canonical DSRM foundation
  • Gregor & Hevner (2013) - Positioning DSR in IS research
  • Vaishnavi & Kuechler (2015) - DSR process models

6. Applicability & Use Cases

A-DSRM applies to:

AI SecurityResearch MethodologyGovernanceCybersecurity

Use cases include:

  • Architecture design and review
  • Security control implementation
  • Research extension and replication
  • Teaching and laboratory exercises
  • Policy and governance analysis

7. Limitations & Scope

Adoption requires cultural shift from waterfall research practices. Longitudinal validation ongoing. Cross-disciplinary applicability beyond security domains requires additional case studies.

8. Iteration & Evolution

A-DSRM itself follows its own principles—the methodology evolves as new adversarial patterns emerge and additional validation evidence accumulates from the research community.

9. How to Cite This Artifact

J. Nsoh, "Agile-Infused Design Science Research Methodology: A Systematic Review and Extension for Adversarial AI Systems," ACM Computing Surveys, 2026. Available: https://jovita.io/artifacts/a-dsrm-methodology

11. License & Availability

License: CC BY 4.0

Last Updated: 2026-01-28

Where applicable, reference implementations and simulation configurations will be published as linked materials under this artifact record.

A-DSRM represents an applied research contribution produced through Design Science Research Methodology. Its value lies not only in correctness, but in whether it can be implemented, evaluated, and trusted in real operational environments.