Search results

1 – 10 of 48
Open Access
Book part
Publication date: 18 July 2022

Christian Versloot, Maria Iacob and Klaas Sikkel

Utility strikes have spawned companies specializing in providing a priori analyses of the underground. Geophysical techniques such as Ground Penetrating Radar (GPR) are harnessed…

Abstract

Utility strikes have spawned companies specializing in providing a priori analyses of the underground. Geophysical techniques such as Ground Penetrating Radar (GPR) are harnessed for this purpose. However, analyzing GPR data is labour-intensive and repetitive. It may therefore be worthwhile to amplify this process by means of Machine Learning (ML). In this work, harnessing the ADR design science methodology, an Intelligence Amplification (IA) system is designed that uses ML for decision-making with respect to utility material type. It is driven by three novel classes of Convolutional Neural Networks (CNNs) trained for this purpose, which yield accuracies of 81.5% with outliers of 86%. The tool is grounded in the available literature on IA, ML and GPR and is embedded into a generic analysis process. Early validation activities confirm its business value.

Open Access
Book part
Publication date: 6 May 2019

Michael Rigby, Shalmali Deshpande, Daniela Luzi, Fabrizio Pecoraro, Oscar Tamburis, Ilaria Rocco, Barbara Corso, Nadia Minicuci, Harshana Liyanage, Uy Hoang, Filipa Ferreira, Simon de Lusignan, Ekelechi MacPepple and Heather Gage

In order to assess the state of health of Europe’s children, or to appraise the systems and models of healthcare delivery, data about children are essential, with as much…

Abstract

In order to assess the state of health of Europe’s children, or to appraise the systems and models of healthcare delivery, data about children are essential, with as much precision and accuracy as possible by small group characteristic. Unfortunately, the experience of the Models of Child Health Appraised (MOCHA) project and its scientists shows that this ideal is seldom met, and thus the accuracy of appraisal or planning work is compromised. In the project, we explored the data collected on children by a number of databases used in Europe and globally, to find that although the four quinquennial age bands are common, it is impossible to represent children aged 0–17 years as a legally defined group in statistical analysis. Adolescents, in particular, are the most invisible age group despite this being a time of life when they are rapidly changing and facing increasing challenges. In terms of measurement and monitoring, there is little progress from work of nearly two decades ago that recommended an information system, and no focus on the creation of a policy and ethical framework to allow collaborative analysis of the rich anonymised databases that hold real-world people-based data. In respect of data systems and surveillance, nearly all systems in European society pay lip service to the importance of children, but do not accommodate them in a practical and statistical sense.

Details

Issues and Opportunities in Primary Health Care for Children in Europe
Type: Book
ISBN: 978-1-78973-354-9

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 18 July 2022

Ednilson Bernardes and Hervé Legenvre

Smart industry initiatives focus on intelligent and interconnected cyber-physical systems. These initiatives develop complex technical architectures that integrate heterogenous…

Abstract

Smart industry initiatives focus on intelligent and interconnected cyber-physical systems. These initiatives develop complex technical architectures that integrate heterogenous technologies, causing significant organizational complexity. Tapping into the digital capabilities of distant partners while capturing profit from such innovation is demanding. Furthermore, firms often need to establish and orchestrate inter-organizational collaborations without prior relations or established trust. As a result, smart industry initiatives bring together disparate organizational forms and institutional environments, distinctive knowledge bases, and geographically dispersed organizations. We conceptualize this organizational capability as ‘distant capabilities integration’. This research explores the governance mechanisms that support such integration and their relation to value capture. We analyse 11 IoT case studies organized in three categories (process, product and technologies) of smart industry initiatives. Building on existing literature, we consider different ways to describe distance, including knowledge heterogeneity and organizational, geographical, institutional, cultural and cognitive distance. Finally, we describe the governance mode appropriate for upstream (developing foundational technologies) and downstream (leveraging existing distant technologies) smart industry initiatives.

Details

Smart Industry – Better Management
Type: Book
ISBN: 978-1-80117-715-3

Keywords

Open Access
Book part
Publication date: 1 May 2019

Nick M. Hollely and Graeme D. Larsen

This research subscribes to the on-going process school of construction project briefing. Stakeholders underrepresented in the literature are engaged with by focussing on Formula…

Abstract

Purpose

This research subscribes to the on-going process school of construction project briefing. Stakeholders underrepresented in the literature are engaged with by focussing on Formula 1 motor racing circuits. Attention is given to the rationales through which stakeholders define construction projects at such venues. The aim of this paper is to understand the realities experienced by stakeholders and how these resonate with the rhetoric of briefing literatures.

Design/Methodology/Approach

A single case-based research approach, encouraged for studying informality and emergence, was used to study a heritage oriented construction project at Silverstone Formula 1 Circuit, UK. Data included field-notes, interviews and strategy documents. Stakeholder interests cannot be directly accessed; however, language used when defining projects can be. Analysis focussed on how project rationales drawn directly from data could be grouped into interpretative repertoires. These repertoires are linguistic resources, drawn upon by stakeholders, formed partly from sets of rationales oriented around a common interest.

Findings

The priorities given to competing rationales are found to fluctuate through time and depending on audience. Project advocates mobilise these conflicting rationales, from different repertoires, to different audiences simultaneously when strategically defining the heritage project. Discursive definitions emerged during analysis through studying both formal and informal briefing practices.

Research Limitations/Implications

Conflict among stakeholders with competing agendas during briefing is widely recognised however references to discursivity are currently scant.

Practical Implications

Coping with discursivity during briefing poses significant challenges for construction professionals.

Originality/Value

By interpreting strategic briefing as an on-going and discursive process of project definition, researchers and practitioners can better empathise with realities experienced by stakeholders.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Open Access
Book part
Publication date: 9 November 2020

Donato Cutolo, Simone Ferriani and Gino Cattani

Strategy scholars have widely recognized the central role that narratives play in the construction of organizational identities. Moreover, storytelling is an important strategic…

Abstract

Strategy scholars have widely recognized the central role that narratives play in the construction of organizational identities. Moreover, storytelling is an important strategic asset that firms can leverage to inspire employees, excite investors and engage customers' attention. This chapter illustrates how advancements in computational linguistic may offer opportunities to analyze the stylistic elements that make a story more convincing. Specifically, we use a topic model to examine how narrative conventionality influences the performance of 78,758 craftsmen selling their handmade items in the digital marketplace of Etsy. Our findings provide empirical evidence that effective narratives display enough conventional features to align with audience expectations, yet preserve some uniqueness to pique audience interest. By elucidating our approach, we hope to stimulate further research at the interface of style, language and strategy.

Details

Aesthetics and Style in Strategy
Type: Book
ISBN: 978-1-80043-236-9

Keywords

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

“The unexamined life is not worth living” (Socrates). That is, without critically inquiring into the knowledge of life which is well-being and valuable, life is not worth living…

Abstract

Executive Summary

“The unexamined life is not worth living” (Socrates). That is, without critically inquiring into the knowledge of life which is well-being and valuable, life is not worth living. Critical thinking questions existing theories and their unexamined and obsessive assumptions and generalizations, constraints, and “best” practices of the prevailing system of management and tries to replace them with more valid assumptions and generalizations that uphold the dignity, uniqueness, and inalienable rights of the individual person and the community. Better outcomes result from asking the right questions than from having the right answers. In the diverse, pluralist cultural environment of today, the promise of a truly generative dialog among Occidental (Western) and Oriental (Eastern) cultures and civilizations holds great hope for the future. Critical thinking (CT) is an “inclusive” thinking system that can facilitate this dialog such that all of us have a meaningful space and place in this universe. After defining CT and arguing its importance for executives, this chapter introduces CT in two parts: Part 1: Various Approaches to Critical Thinking; Part 2: Major Theories of Critical Thinking. Several contemporary business cases will be invoked to illustrate the need, nature, and scope of corporate CT.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Open Access
Book part
Publication date: 4 May 2018

Nurlaila, Syahron Lubis, Tengku Sylvana Sinar and Muhizar Muchtar

Purpose – This paper is aimed at describing semantics equivalence of cultural terms in meurukon texts translated from Acehnese into Indonesian. A qualitative descriptive approach…

Abstract

Purpose – This paper is aimed at describing semantics equivalence of cultural terms in meurukon texts translated from Acehnese into Indonesian. A qualitative descriptive approach is used to analyze the context of semantics equivalence in these texts: varied semantics structure, especially the ones caused by the cultural gap between the two languages.

Design/Methodology/Approach – This research is designed to be of qualitative descriptive nature, wherein data are documented and analyzed using various methods proposed by Miles, Huberman, and Saldana (2014), such as data condensation, data display, drawing and verifying conclusions. The researcher is considered the key instrument in the whole process. The source of the data collected is from meurukon texts and its translation that consists of 623 sentences: they mainly comprise words and phrases that contain semantics equivalence of cultural terms.

Findings – The result of the research shows that there are 129 cultural terms found in 623 sentences. Of the analyzed data, it is seen that only 16.66% of the data is not equivalent with the target text, while 83.34% words and phrases of meurukon text are equivalent. This suggests that as a result of translation, the meurukon text has high semantics or lexical equivalences with the target text.

Research Limitations/Implications – This research is focused on semantics equivalence found in meurukon texts. The semantic equivalence here only pertains to lexical meaning of nouns and adjectives by using componential analysis.

Practical Implications – The result can be used in a sample of ways for the analysis of semantics equivalence of cultural terms in meurukon text translated from Acehnese into Indonesian using componential analysis.

Originality/Value – This research identifies meurukon as an oral tradition of Acehnese culture, which is in the question and answer format about Islamic law in Aceh, specifically North Aceh.

Details

Proceedings of MICoMS 2017
Type: Book
ISBN:

Keywords

Open Access
Book part
Publication date: 1 October 2018

Steen Steensen

This chapter analyses the Norwegian Twitter-sphere during and in the aftermath of the terrorist attack in Norway on 22 July 2011. Based on a collection of 2.2 million tweets…

Abstract

This chapter analyses the Norwegian Twitter-sphere during and in the aftermath of the terrorist attack in Norway on 22 July 2011. Based on a collection of 2.2 million tweets representing the Twitter-sphere during the period 20 July–28 August 2011, the chapter seeks answers to how the micro-blogging services aided in creating situation awareness (SA) related to the emergency event, what role hashtags played in that process and who the dominant crisis communicators were. The chapter is framed by theories and previous research on SA and social media use in the context of emergency events. The findings reveal that Twitter was important in establishing SA both during and in the aftermath of the terrorist attack, that hashtags were of limited value in this process during the critical phase, and that unexpected actors became key communicators.

Details

Social Media Use in Crisis and Risk Communication
Type: Book
ISBN: 978-1-78756-269-1

Keywords

1 – 10 of 48