Search results
1 – 10 of 687Kazuyuki Motohashi and Chen Zhu
This study aims to assess the technological capability of Chinese internet platforms (BAT: Baidu, Alibaba, Tencent) compared to US ones (GAFA: Google, Amazon, Facebook, Apple)…
Abstract
Purpose
This study aims to assess the technological capability of Chinese internet platforms (BAT: Baidu, Alibaba, Tencent) compared to US ones (GAFA: Google, Amazon, Facebook, Apple). More specifically, this study explores Baidu’s technological catching-up process with Google by analyzing their patent textual information.
Design/methodology/approach
The authors retrieved 26,383 Google patents and 6,695 Baidu patents from PATSTAT 2019 Spring version. The collected patent documents were vectorized using the Word2Vec model first, and then K-means clustering was applied to visualize the technological space of two firms. Finally, novel indicators were proposed to capture the technological catching-up process between Baidu and Google.
Findings
The results show that Baidu follows a trend of US rather than Chinese technology which suggests Baidu is aggressively seeking to catch up with US players in the process of its technological development. At the same time, the impact index of Baidu patents increases over time, reflecting its upgrading of technological competitiveness.
Originality/value
This study proposed a new method to analyze technology mapping and evolution based on patent text information. As both US and China are crucial players in the internet industry, it is vital for policymakers in third countries to understand the technological capacity and competitiveness of both countries to develop strategic partnerships effectively.
Details
Keywords
Rosalina Rebucas Estacio and Rodolfo Callanta Raga Jr
The purpose of this paper is to describe a proposal for a data-driven investigation aimed at determining whether students’ learning behavior can be extracted and visualized from…
Abstract
Purpose
The purpose of this paper is to describe a proposal for a data-driven investigation aimed at determining whether students’ learning behavior can be extracted and visualized from action logs recorded by Moodle. The paper also tried to show whether there is a correlation between the activity level of students in online environments and their academic performance with respect to final grade.
Design/methodology/approach
The analysis was carried out using log data obtained from various courses dispensed in a university using a Moodle platform. The study also collected demographic profiles of students and compared them with their activity level in order to analyze how these attributes affect students’ level of activity in the online environment.
Findings
This work has shown that data mining algorithm like vector space model can be used to aggregate the action logs of students and quantify it into a single numeric value that can be used to generate visualizations of students’ level of activity. The current investigation indicates that there is a lot of variability in terms of the correlation between these two variables.
Practical implications
The value presented in the study can help instructors monitor course progression and enable them to rapidly identify which students are not performing well and adjust their pedagogical strategies accordingly.
Originality/value
A plan to continue the work by developing a complete dashboard style interface that instructors can use is already underway. More data need to be collected and more advanced processing tools are necessary in order to obtain a better perspective on this issue.
Details
Keywords
Giovana Sordi Schiavi, Ariel Behr and Carla Bonato Marcolin
This paper aims to elaborate a set of characteristics that conceptualize and qualify a disruptive business model.
Abstract
Purpose
This paper aims to elaborate a set of characteristics that conceptualize and qualify a disruptive business model.
Design/methodology/approach
The literature on disruptive business models will be analyzed using the latent semantic analysis (LSA) technique, complemented by content analysis, to obtain a more precise qualification and conceptualization regarding disruptive business models.
Findings
The results found described concepts already described in the theory. However, such findings, highlighted by the LSA, bring new perspectives to the analysis of the disruptive business models, little discussed in the literature and which reveal important considerations to be made on this subject.
Research limitations/implications
It should be noted, about the technique used, a limitation on the choice of the number of singular values. For this to be a problem in the open literature, the authors tried to work not just with the cost-benefit ratio given the addition of each new dimension in the analysis, as well as a criterion of saturation of the terms presented.
Practical implications
The presentation of this set of characteristics can be used as a validation tool to identify if a business is or is not a disruptive business model by managers.
Originality/value
The originality of this paper is the achievement of a consolidated set of characteristics that conceptualize and qualify the disruptive business models by conducting an in-depth analysis of the literature on disruptive business models through the LSA technique, considering the difficulty of obtaining precise concepts on this subject in the literature.
Details
Keywords
Bufei Xing, Haonan Yin, Zhijun Yan and Jiachen Wang
The purpose of this paper is to propose a new approach to retrieve similar questions in online health communities to improve the efficiency of health information retrieval and…
Abstract
Purpose
The purpose of this paper is to propose a new approach to retrieve similar questions in online health communities to improve the efficiency of health information retrieval and sharing.
Design/methodology/approach
This paper proposes a hybrid approach to combining domain knowledge similarity and topic similarity to retrieve similar questions in online health communities. The domain knowledge similarity can evaluate the domain distance between different questions. And the topic similarity measures questions’ relationship base on the extracted latent topics.
Findings
The experiment results show that the proposed method outperforms the baseline methods.
Originality/value
This method conquers the problem of word mismatch and considers the named entities included in questions, which most of existing studies did not.
Details
Keywords
Loretta Mastroeni, Maurizio Naldi and Pierluigi Vellucci
Though the circular economy (CE) is a current buzzword, this still lacks a precise definition. In the absence of a clear notion of what that term includes, actions taken by the…
Abstract
Purpose
Though the circular economy (CE) is a current buzzword, this still lacks a precise definition. In the absence of a clear notion of what that term includes, actions taken by the government and companies may not be well informed. In particular, those actions need to consider what people mean when people talk about the CE, either to refocus people's decisions or to undertake a more effective communications strategy.
Design/methodology/approach
Since people voice people's opinions mainly through social media nowadays, special attention has to be paid to discussions on those media. In this paper, the authors focus on Twitter as a popular social platform to deliver one's thoughts quickly and fast. The authors' research aim is to get the perceptions of people about the CE. After collecting more than 100,000 tweets over 16 weeks, the authors analyse those tweets to understand the public discussion about the CE. The authors conduct a frequency analysis of the most recurring words, including the words' association with other words in the same context and categorise them into a set of topics.
Findings
The authors show that the discussion focuses on the usage of resources and materials that heavily endanger sustainability, i.e. carbon and plastic and the harmful habit of wasting. On the other hand, the two most common good practices associated with the CE and sustainability emerge as recycling and reuse (the latter being mentioned far less). Also, the business side of the CE appears to be relevant.
Research limitations/implications
The outcome of this analysis can drive suitable communication strategies by which companies and governments interested in the development of the CE can understand what is actually discussed on social media and call for the attention.
Originality/value
This paper addresses the lack of a standard definition the authors highlighted in the Introduction. The results confirm that people understand CE by looking both at CE's constituent activities and CE's expected consequences, namely the reduction of waste, the transition to a green economy free of plastic and other pollutants and the improvement of the world climate.
Details
Keywords
Florian Fahrenbach, Kate Revoredo and Flavia Maria Santoro
This paper aims to introduce an information and communication technology (ICT) artifact that uses text mining to support the innovative and standardized assessment of professional…
Abstract
Purpose
This paper aims to introduce an information and communication technology (ICT) artifact that uses text mining to support the innovative and standardized assessment of professional competences within the validation of prior learning (VPL). Assessment means comparing identified and documented professional competences against a standard or reference point. The designed artifact is evaluated by matching a set of curriculum vitae (CV) scraped from LinkedIn against a comprehensive model of professional competence.
Design/methodology/approach
A design science approach informed the development and evaluation of the ICT artifact presented in this paper.
Findings
A proof of concept shows that the ICT artifact can support assessors within the validation of prior learning procedure. Rather the output of such an ICT artifact can be used to structure documentation in the validation process.
Research limitations/implications
Evaluating the artifact shows that ICT support to assess documented learning outcomes is a promising endeavor but remains a challenge. Further research should work on standardized ways to document professional competences, ICT artifacts capture the semantic content of documents, and refine ontologies of theoretical models of professional competences.
Practical implications
Text mining methods to assess professional competences rely on large bodies of textual data, and thus a thoroughly built and large portfolio is necessary as input for this ICT artifact.
Originality/value
Following the recent call of European policymakers to develop standardized and ICT-based approaches for the assessment of professional competences, an ICT artifact that supports the automatized assessment of professional competences within the validation of prior learning is designed and evaluated.
Details
Keywords
Social networks (SNs) have recently evolved from a means of connecting people to becoming a tool for social engineering, radicalization, dissemination of propaganda and…
Abstract
Purpose
Social networks (SNs) have recently evolved from a means of connecting people to becoming a tool for social engineering, radicalization, dissemination of propaganda and recruitment of terrorists. It is no secret that the majority of the Islamic State in Iraq and Syria (ISIS) members are Arabic speakers, and even the non-Arabs adopt Arabic nicknames. However, the majority of the literature researching the subject deals with non-Arabic languages. Moreover, the features involved in identifying radical Islamic content are shallow and the search or classification terms are common in daily chatter among people of the region. The authors aim at distinguishing normal conversation, influenced by the role religion plays in daily life, from terror-related content.
Design/methodology/approach
This article presents the authors' experience and the results of collecting, analyzing and classifying Twitter data from affiliated members of ISIS, as well as sympathizers. The authors used artificial intelligence (AI) and machine learning classification algorithms to categorize the tweets, as terror-related, generic religious, and unrelated.
Findings
The authors report the classification accuracy of the K-nearest neighbor (KNN), Bernoulli Naive Bayes (BNN) and support vector machine (SVM) [one-against-all (OAA) and all-against-all (AAA)] algorithms. The authors achieved a high classification F1 score of 83\%. The work in this paper will hopefully aid more accurate classification of radical content.
Originality/value
In this paper, the authors have collected and analyzed thousands of tweets advocating and promoting ISIS. The authors have identified many common markers and keywords characteristic of ISIS rhetoric. Moreover, the authors have applied text processing and AI machine learning techniques to classify the tweets into one of three categories: terror-related, non-terror political chatter and news and unrelated data-polluting tweets.
Details
Keywords
Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis
This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…
Abstract
Purpose
This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.
Design/methodology/approach
The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.
Findings
The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.
Originality/value
This is the first in-depth, quantitative mapping study of all privacy research.
Details
Keywords
Dolores Modic, Ana Hafner, Nadja Damij and Luka Cehovin Zajc
The purpose of this paper is to evaluate innovations in intellectual property rights (IPR) databases, techniques and software tools, with an emphasis on selected new developments…
Abstract
Purpose
The purpose of this paper is to evaluate innovations in intellectual property rights (IPR) databases, techniques and software tools, with an emphasis on selected new developments and their contribution towards achieving advantages for IPR management (IPRM) and wider social benefits. Several industry buzzwords are addressed, such as IPR-linked open data (IPR LOD) databases, blockchain and IPR-related techniques, acknowledged for their contribution in moving towards artificial intelligence (AI) in IPRM.
Design/methodology/approach
The evaluation, following an original framework developed by the authors, is based on a literature review, web analysis and interviews carried out with some of the top experts from IPR-savvy multinational companies.
Findings
The paper presents the patent databases landscape, classifying patent offices according to the format of data provided and depicting the state-of-art in the IPR LOD. An examination of existing IPR tools shows that they are not yet fully developed, with limited usability for IPRM. After reviewing the techniques, it is clear that the current state-of-the-art is insufficient to fully address AI in IPR. Uses of blockchain in IPR show that they are yet to be fully exploited on a larger scale.
Originality/value
A critical analysis of IPR tools, techniques and blockchain allows for the state-of-art to be assessed, and for their current and potential value with regard to the development of the economy and wider society to be considered. The paper also provides a novel classification of patent offices and an original IPR-linked open data landscape.
Details
Keywords
Kimmo Kettunen, Heikki Keskustalo, Sanna Kumpulainen, Tuula Pääkkönen and Juha Rautiainen
This study aims to identify user perception of different qualities of optical character recognition (OCR) in texts. The purpose of this paper is to study the effect of different…
Abstract
Purpose
This study aims to identify user perception of different qualities of optical character recognition (OCR) in texts. The purpose of this paper is to study the effect of different quality OCR on users' subjective perception through an interactive information retrieval task with a collection of one digitized historical Finnish newspaper.
Design/methodology/approach
This study is based on the simulated work task model used in interactive information retrieval. Thirty-two users made searches to an article collection of Finnish newspaper Uusi Suometar 1869–1918 which consists of ca. 1.45 million autosegmented articles. The article search database had two versions of each article with different quality OCR. Each user performed six pre-formulated and six self-formulated short queries and evaluated subjectively the top 10 results using a graded relevance scale of 0–3. Users were not informed about the OCR quality differences of the otherwise identical articles.
Findings
The main result of the study is that improved OCR quality affects subjective user perception of historical newspaper articles positively: higher relevance scores are given to better-quality texts.
Originality/value
To the best of the authors’ knowledge, this simulated interactive work task experiment is the first one showing empirically that users' subjective relevance assessments are affected by a change in the quality of an optically read text.
Details