Search results
1 – 5 of 5Daniela Lydia Krause, Elif Weidinger, Judith Matz, Agnes Wildenauer, Jenny Katharina Wagner, Michael Obermeier, Michael Riedel, Hans-Jürgen Möller and Norbert Müller
There are several infectious agents in the environment that can cause persistent infections in the host. They usually cause their symptoms shortly after first infection and later…
Abstract
There are several infectious agents in the environment that can cause persistent infections in the host. They usually cause their symptoms shortly after first infection and later persist as silent viruses and bacteria within the body. However, these chronic infections may play an important role in the pathogenesis of schizophrenia and Tourette's syndrome (TS). We investigated the distribution of different neurotrophic infectious agents in TS, schizophrenia and controls. A total of 93 individuals were included (schizophrenic patients, Tourette patients and controls). We evaluated antibodies against cytomegalovirus (CMV), herpes-simplex virus (HSV), Epstein-Barr virus, Toxoplasma, Mycoplasma and Chlamydia trachomatis/pneumoniae. By comparing schizophrenia and TS, we found a higher prevalence of HSV (P=0.017) and CMV (P=0.017) antibodies in schizophrenic patients. Considering the relationship between schizophrenia, TS and healthy controls, we showed that there are associations for Chlamydia trachomatis (P=0.007), HSV (P=0.027) and CMV (P=0.029). When all measured viruses, bacteria and protozoa were combined, schizophrenic patients had a higher rate of antibodies to infectious agents than TS patients (P=0.049). Tourette and schizophrenic patients show a different vulnerability to infectious agents. Schizophrenic patients were found to have a higher susceptibility to viral infections than individuals with TS. This finding might point to a modification in special immune parameters in these diseases.
Details
Keywords
Giacomo Pigatto, John Dumay, Lino Cinquini and Andrea Tenucci
This research aims to examine and understand the rationales and modalities behind the use of disclosure before, during and after a corporate governance scandal involving CPA…
Abstract
Purpose
This research aims to examine and understand the rationales and modalities behind the use of disclosure before, during and after a corporate governance scandal involving CPA Australia (CPAA).
Design/methodology/approach
Data beyond CPAA's annual reports were collected, such as news articles, media releases, an independent review panel (IRP) report, and the Chief Operating Officer's letter to members. These disclosures were manually coded and analysed through the word counts and word trees in NVivo. This study also relied on Norbert Elias' conceptual tool of power games among networks of actors – figurations – to model the scandal as a power game between the old Board, the press, concerned members, the IRP and the new Board. This study analysed the data to reveal a collective and in fieri power balance that changed with the phases of the scandal.
Findings
A mix of voluntary, involuntary, requested and absent disclosures was important in triggering, managing and ending the CPAA scandal. Moreover, communication and disclosure fulfilled a constitutive role since both: mobilised actors, enabled coordination among actors, contributed to pursuing shared goals and influenced power balances. Such a constitutive role was at the heart of the ability of coalitions of figurations to challenge and restore the powerful status quo.
Originality/value
This research introduces to accounting studies the collective and in fieri dimensions of power from figurational theory. Moreover, the research sheds new light on using voluntary, involuntary, requested and absent disclosures before, during and after a corporate crisis.
Details
Keywords
Tim Gorichanaz, Jonathan Furner, Lai Ma, David Bawden, Lyn Robinson, Dominic Dixon, Ken Herold, Sille Obelitz Søe, Betsy Van der Veer Martens and Luciano Floridi
The purpose of this paper is to review and discuss Luciano Floridi’s 2019 book The Logic of Information: A Theory of Philosophy as Conceptual Design, the latest instalment in his…
Abstract
Purpose
The purpose of this paper is to review and discuss Luciano Floridi’s 2019 book The Logic of Information: A Theory of Philosophy as Conceptual Design, the latest instalment in his philosophy of information (PI) tetralogy, particularly with respect to its implications for library and information studies (LIS).
Design/methodology/approach
Nine scholars with research interests in philosophy and LIS read and responded to the book, raising critical and heuristic questions in the spirit of scholarly dialogue. Floridi responded to these questions.
Findings
Floridi’s PI, including this latest publication, is of interest to LIS scholars, and much insight can be gained by exploring this connection. It seems also that LIS has the potential to contribute to PI’s further development in some respects.
Research limitations/implications
Floridi’s PI work is technical philosophy for which many LIS scholars do not have the training or patience to engage with, yet doing so is rewarding. This suggests a role for translational work between philosophy and LIS.
Originality/value
The book symposium format, not yet seen in LIS, provides forum for sustained, multifaceted and generative dialogue around ideas.
Details
Keywords
The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the…
Abstract
Purpose
The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the organization of sciences and Fuchs’ (1993) theory about scientific change.
Design/methodology/approach
The study combines historical source analysis with conceptual and theoretical analysis for characterizing LIS. An attempt is made to empirically validate the distinction between LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.
Findings
The origin of fragmentation in LIS due the contributions of other disciplines can be traced in the 1960s and 1970s for solving the problems produced by the growth of scientific literature. Computer science and business established academic programs and started research relevant to LIS community focusing on information retrieval and bibliometrics. This has led to differing research interests between LIS and other disciplines concerning research topics and methods. LIS has been characterized as fragmented adhocracy as a whole, but we make a distinction between research topics LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.
Originality/value
The paper provides an elaborated historical perspective on the fragmentation of LIS in the pressure of other disciplines. It also characterizes LIS as discipline in a fresh way by applying Whitley’s (1984) theory.
Details
Keywords
The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems…
Abstract
Purpose
The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems contexts may be inappropriate for use within an IoT context. The purpose of this paper is to offer empirically generated understandings of trust within potential IoT applications.
Design/methodology/approach
In an attempt to capture and communicate the complex and all-pervading but frequently inconspicuous nature of ubiquitous technologies within potential IoT techno-systems, propositions developed are investigated using a novel mixed methods research design combining a videographic projective technique with a quantitative survey, sampling 1,200 respondents.
Findings
Research findings suggest the dimensionality of trust may vary according to the IoT techno-service context being assessed.
Originality/value
The contribution of this paper is twofold. First, and from a theoretical perspective, it offers a conceptual foundation for trust dimensions within potential IoT applications based upon empirical evaluation. Second, and from a pragmatic perspective, the paper offers insights into how findings may guide practitioners in developing appropriate trust management systems dependent upon the characteristics of particular techno-service contexts.
Details