Search results
1 – 10 of 93Mahmoud Al-Ayyoub, Ahmed Alwajeeh and Ismail Hmeidi
The authorship authentication (AA) problem is concerned with correctly attributing a text document to its corresponding author. Historically, this problem has been the…
Abstract
Purpose
The authorship authentication (AA) problem is concerned with correctly attributing a text document to its corresponding author. Historically, this problem has been the focus of various studies focusing on the intuitive idea that each author has a unique style that can be captured using stylometric features (SF). Another approach to this problem, known as the bag-of-words (BOW) approach, uses keywords occurrences/frequencies in each document to identify its author. Unlike the first one, this approach is more language-independent. This paper aims to study and compare both approaches focusing on the Arabic language which is still largely understudied despite its importance.
Design/methodology/approach
Being a supervised learning problem, the authors start by collecting a very large data set of Arabic documents to be used for training and testing purposes. For the SF approach, they compute hundreds of SF, whereas, for the BOW approach, the popular term frequency-inverse document frequency technique is used. Both approaches are compared under various settings.
Findings
The results show that the SF approach, which is much cheaper to train, can generate more accurate results under most settings.
Practical implications
Numerous advantages of efficiently solving the AA problem are obtained in different fields of academia as well as the industry including literature, security, forensics, electronic markets and trading, etc. Another practical implication of this work is the public release of its sources. Specifically, some of the SF can be very useful for other problems such as sentiment analysis.
Originality/value
This is the first study of its kind to compare the SF and BOW approaches for authorship analysis of Arabic articles. Moreover, many of the computed SF are novel, while other features are inspired by the literature. As SF are language-dependent and most existing papers focus on English, extra effort must be invested to adapt such features to Arabic text.
Details
Keywords
The purpose of this paper is to demonstrate how changes in K-12 educational delivery methods in the USA impacts students as 1:1 device programs become a required tool for…
Abstract
Purpose
The purpose of this paper is to demonstrate how changes in K-12 educational delivery methods in the USA impacts students as 1:1 device programs become a required tool for learning. This change produces gaps in knowledge and understanding of the digital environment and exposes minors to risk. Mandatory technology integration by school districts places the ethical responsibility on school districts to prepare students to use the digital environment to mitigate risk.
Design/methodology/approach
The author’s literature review focused on the impact of personal device integration in education on students. The author surveyed teachers in the district on what they perceived as risk to students accessing the digital environment and what they believe creates value in digital citizenship instructional content. The author also gathered information while serving on the school district technology steering committee and digital citizenship working group.
Findings
Mandatory 1:1 device programs used for learning provide unlimited access to the digital environment. This technology integration creates digital knowledge gaps in understanding among students and exposes them to risk or dangers such as loss of privacy, psychological harms and engaging in or being a victim of illegal online activities. School districts are responsible for providing a remedy to close this gap and mitigate risk by developing learning content resources for teachers.
Social implications
As 1:1 device programs continue to grow in school districts in the USA, it is essential for students to learn to apply protocols and understand norms of the digital world. Providing a digital citizenship curriculum in a format such as a Google Site will offer educators access to instructional content that teaches students to apply protocols, understand norms of the internet and social media and foster critical thinking to analyze power structures, biases and recognize manipulation online. Student must learn how to apply rules that challenge assumptions behind the digital content they see, and they must be able to identify and resolve digital practices and behaviors that are problematic, so they are prepared to participate in a digital society.
Originality/value
This perspective may be relevant to school districts contemplating personal device integration, providing insight into how 1:1 device use impacts students and develops an ethical position for creating digital citizenship resources for teachers.
Details
Keywords
In the context of information retrieval, text genre is as important as its content, and knowledge of the text genre enhances the search engine features by providing…
Abstract
Purpose
In the context of information retrieval, text genre is as important as its content, and knowledge of the text genre enhances the search engine features by providing customized retrieval. The purpose of this study is to explore and evaluate the use of stylometric analysis, a quantitative analysis for the linguistics features of text, to support the task of automated text genre detection for Classical Arabic text.
Design/methodology/approach
Unsupervised clustering and supervised classification were applied on the King Saud University Corpus of Classical Arabic texts (KSUCCA) using the most frequent words in the corpus (MFWs) as stylometric features. Four popular distance measures established in stylometric research are evaluated for the genre detection task.
Findings
The results of the experiments show that stylometry-based genre clustering and classification align well with human-defined genre. The evidence suggests that genre style signals exist for Classical Arabic and can be used to support the task of automated genre detection.
Originality/value
This work targets the task of genre detection in Classical Arabic text using stylometric features, an approach that has only been previously applied to Arabic authorship attribution. The study also provides a comparison of four distance measures used in stylomtreic analysis on the KSUCCA, a corpus with over 50 million words of Classical Arabic using clustering and classification.
Details
Keywords
Save Ideas Ltd is an Australia-based company and Internet portal for free and instant double protection of intellectual property (ideas of innovators and anyone), one with…
Abstract
Save Ideas Ltd is an Australia-based company and Internet portal for free and instant double protection of intellectual property (ideas of innovators and anyone), one with the Time Certificate stamp and another one based on blockchain technology. Blockchain protection is being upgraded by Initial Coin Offering (ICO) with process of issuing own crypto tokens for the expansion of Save Ideas and at the same time for funding the most promising registered ideas. Process of ICO as the way of financing will be presented in the case of Save Ideas in this chapter.
Details
Keywords
Ismail Hmeidi, Mahmoud Al-Ayyoub, Nizar A. Mahyoub and Mohammed A. Shehab
Multi-label Text Classification (MTC) is one of the most recent research trends in data mining and information retrieval domains because of many reasons such as the rapid…
Abstract
Purpose
Multi-label Text Classification (MTC) is one of the most recent research trends in data mining and information retrieval domains because of many reasons such as the rapid growth of online data and the increasing tendency of internet users to be more comfortable with assigning multiple labels/tags to describe documents, emails, posts, etc. The dimensionality of labels makes MTC more difficult and challenging compared with traditional single-labeled text classification (TC). Because it is a natural extension of TC, several ways are proposed to benefit from the rich literature of TC through what is called problem transformation (PT) methods. Basically, PT methods transform the multi-label data into a single-label one that is suitable for traditional single-label classification algorithms. Another approach is to design novel classification algorithms customized for MTC. Over the past decade, several works have appeared on both approaches focusing mainly on the English language. This work aims to present an elaborate study of MTC of Arabic articles.
Design/methodology/approach
This paper presents a novel lexicon-based method for MTC, where the keywords that are most associated with each label are extracted from the training data along with a threshold that can later be used to determine whether each test document belongs to a certain label.
Findings
The experiments show that the presented approach outperforms the currently available approaches. Specifically, the results of our experiments show that the best accuracy obtained from existing approaches is only 18 per cent, whereas the accuracy of the presented lexicon-based approach can reach an accuracy level of 31 per cent.
Originality/value
Although there exist some tools that can be customized to address the MTC problem for Arabic text, their accuracies are very low when applied to Arabic articles. This paper presents a novel method for MTC. The experiments show that the presented approach outperforms the currently available approaches.
Details
Keywords
Artists operating under a studio model, such as Andy Warhol, have frequently been described as reducing their work to statements of authorship, indicated by the signature…
Abstract
Artists operating under a studio model, such as Andy Warhol, have frequently been described as reducing their work to statements of authorship, indicated by the signature finally affixed to the work. By contrast, luxury goods manufacturers decry as inauthentic and counterfeit the handbags produced during off-shift hours using the same materials and craftsmanship as the authorized goods produced hours earlier. The distinction between authentic and inauthentic often turns on nothing more than a statement of authorship. Intellectual property law purports to value such statements of authenticity, but no statement has value unless it is accepted as valid by its audience, a determination that depends on shared notions of what authenticity means as well as a common understanding of what authenticity designates.
Details
Keywords
To analyze the market reception of multi-authored works of art through the lens of collaborative old master paintings (“formal/prestige collaboration”). This paper tests…
Abstract
Purpose
To analyze the market reception of multi-authored works of art through the lens of collaborative old master paintings (“formal/prestige collaboration”). This paper tests whether multi-authored attribution strategies (i.e. naming two artists as brand names) affect buyers' willingness to pay differently from single-authored works in the auction market.
Design/methodology/approach
This case study focuses on collaborative paintings by Flemish masters, based on a data set comprising 11,630 single-authored and collaborative paintings auctioned between 1946 and 2015. Hedonic regressions have been employed to test whether or not co-branded artworks are differently valued by buyers and how the reputation of each artist might influence valuation.
Findings
Despite the opportunity for buyers to purchase one artwork with two brand names, this study reveals that the average value of collaborative paintings is statistically lower than that of single-authored paintings. This is especially true when a reputed master was involved in the collaboration. The present findings suggest that the valuable characteristics of formal collaborations (i.e. double brand name, dual authorship and reputation, high-quality standards) are no longer perceived and valued as such by buyers, and that co-branding can affect the artist brand equity because of a contagion effect. We argue that integral authorship is more valued than partial authorship, suggesting that the myth of the artist as a lone genius is still well-anchored in purchasing habits.
Research limitations/implications
Prestige collaborations are a very particular form of early co-branding in the art world, with limited data available. Further research should consider larger samples to reiterate the analysis on other collaboration forms in order to challenge the current findings.
Practical implications
Researchers and living artists should be aware that brand building and co-branding are marketing strategies that may generate negative effects on prices in the art market. The perceived and market value of co-branded works are time-varying, and depends on both the context of reception of these works and the reputation of the artists at time t.
Originality/value
This market segment has never been considered in art market studies, although formal collaboration is one of the earliest documented forms of co-branding in the art world. This paper provides new empirical evidence from the auction market, based on buyers' willingness to pay, and it further highlights the reception of multi-authored art objects in Western art markets that particularly value individual creators.
Details
Keywords
Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his…
Abstract
Purpose
Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.
Design/methodology/approach
The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.
Findings
Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.
Originality/value
To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.
Details
Keywords
Victoria Rodner and Chloe Preece
In the contemporary visual art market, for art to be valuable, it must be deemed authentic. In this chapter, we deconstruct the space within which the authentication of…
Abstract
In the contemporary visual art market, for art to be valuable, it must be deemed authentic. In this chapter, we deconstruct the space within which the authentication of art takes place to understand the structural underpinnings of value and its ideological foundations. Through a three-part model, we demonstrate how authenticity in the art market, as a socially constructed concept, relies on the interpretation of cultural brokers who demonstrate recognition of the artist's vision in the work by placing it within an art context and thus legitimising it as culturally valuable. In our spatial analysis, we illustrate the complexity of visual art products and their valuation, demonstrating how authenticity operates through multiple dimensions. Ultimately, we demonstrate that authenticity is an autopoietic market practice which serves to further monopolise power.
Details
Keywords
Digital repositories offer a great benefit to people in a variety of settings, especially since an ever‐increasing amount of information is being gathered, transmitted…
Abstract
Purpose
Digital repositories offer a great benefit to people in a variety of settings, especially since an ever‐increasing amount of information is being gathered, transmitted, and preserved through various technologies. The purpose of this paper is to underscore trust as a critical element in the infrastructure of digital repositories and to look more closely at trusted digital repositories from the perspective of the user communities for which they are designed.
Design/methodology/approach
The paper looks to the literature in reviewing the concept of trust and its role in an online environment. Attention is then paid to trusted digital repositories, with close examination of the user communities’ perceptions of trust and the impact of these perceptions. Special attention is given to users within the academic community.
Findings
While digital repositories may be trustworthy because of adherence to technological standards, accepted practices, and mechanisms for authenticating the authorship and accuracy of their content, it is ultimately their respective stakeholders – both those who deposit and use content – whose perceptions play a central role in ensuring a digital repository's trustworthiness.
Research limitations/implications
A future empirical study would be beneficial in order to measure perceptions of trust as contributing factors to the trustworthiness of digital repositories.
Practical implications
This paper provides a useful resource for persons wishing to review the topic of trusted digital repositories or increase their awareness in this area.
Originality/value
This paper offers a focused look at various levels of trust as they relate to the dissemination of scholarly communication in the academic world, particularly through institutional repositories.
Details