Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of 93
To view the access options for this content please click here
Article
Publication date: 18 April 2017

An extensive study of authorship authentication of Arabic articles

Mahmoud Al-Ayyoub, Ahmed Alwajeeh and Ismail Hmeidi

The authorship authentication (AA) problem is concerned with correctly attributing a text document to its corresponding author. Historically, this problem has been the…

HTML
PDF (641 KB)

Abstract

Purpose

The authorship authentication (AA) problem is concerned with correctly attributing a text document to its corresponding author. Historically, this problem has been the focus of various studies focusing on the intuitive idea that each author has a unique style that can be captured using stylometric features (SF). Another approach to this problem, known as the bag-of-words (BOW) approach, uses keywords occurrences/frequencies in each document to identify its author. Unlike the first one, this approach is more language-independent. This paper aims to study and compare both approaches focusing on the Arabic language which is still largely understudied despite its importance.

Design/methodology/approach

Being a supervised learning problem, the authors start by collecting a very large data set of Arabic documents to be used for training and testing purposes. For the SF approach, they compute hundreds of SF, whereas, for the BOW approach, the popular term frequency-inverse document frequency technique is used. Both approaches are compared under various settings.

Findings

The results show that the SF approach, which is much cheaper to train, can generate more accurate results under most settings.

Practical implications

Numerous advantages of efficiently solving the AA problem are obtained in different fields of academia as well as the industry including literature, security, forensics, electronic markets and trading, etc. Another practical implication of this work is the public release of its sources. Specifically, some of the SF can be very useful for other problems such as sentiment analysis.

Originality/value

This is the first study of its kind to compare the SF and BOW approaches for authorship analysis of Arabic articles. Moreover, many of the computed SF are novel, while other features are inspired by the literature. As SF are language-dependent and most existing papers focus on English, extra effort must be invested to adapt such features to Arabic text.

Details

International Journal of Web Information Systems, vol. 13 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/IJWIS-03-2016-0011
ISSN: 1744-0084

Keywords

  • Arabic text processing
  • Authorship authentication
  • Bag-of-words
  • Stylometric features

To view the access options for this content please click here
Article
Publication date: 13 August 2018

Teaching students out of harm’s way : Mitigating digital knowledge gaps and digital risk created by 1:1 device programs in K-12 education in the USA

Esther Charlotte Moon

The purpose of this paper is to demonstrate how changes in K-12 educational delivery methods in the USA impacts students as 1:1 device programs become a required tool for…

HTML
PDF (162 KB)

Abstract

Purpose

The purpose of this paper is to demonstrate how changes in K-12 educational delivery methods in the USA impacts students as 1:1 device programs become a required tool for learning. This change produces gaps in knowledge and understanding of the digital environment and exposes minors to risk. Mandatory technology integration by school districts places the ethical responsibility on school districts to prepare students to use the digital environment to mitigate risk.

Design/methodology/approach

The author’s literature review focused on the impact of personal device integration in education on students. The author surveyed teachers in the district on what they perceived as risk to students accessing the digital environment and what they believe creates value in digital citizenship instructional content. The author also gathered information while serving on the school district technology steering committee and digital citizenship working group.

Findings

Mandatory 1:1 device programs used for learning provide unlimited access to the digital environment. This technology integration creates digital knowledge gaps in understanding among students and exposes them to risk or dangers such as loss of privacy, psychological harms and engaging in or being a victim of illegal online activities. School districts are responsible for providing a remedy to close this gap and mitigate risk by developing learning content resources for teachers.

Social implications

As 1:1 device programs continue to grow in school districts in the USA, it is essential for students to learn to apply protocols and understand norms of the digital world. Providing a digital citizenship curriculum in a format such as a Google Site will offer educators access to instructional content that teaches students to apply protocols, understand norms of the internet and social media and foster critical thinking to analyze power structures, biases and recognize manipulation online. Student must learn how to apply rules that challenge assumptions behind the digital content they see, and they must be able to identify and resolve digital practices and behaviors that are problematic, so they are prepared to participate in a digital society.

Originality/value

This perspective may be relevant to school districts contemplating personal device integration, providing insight into how 1:1 device use impacts students and develops an ethical position for creating digital citizenship resources for teachers.

Details

Journal of Information, Communication and Ethics in Society, vol. 16 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/JICES-02-2018-0012
ISSN: 1477-996X

Keywords

  • Digital scholarship
  • Ethics education
  • Digital divide(s)
  • Digital citizenship
  • Digital knowledge gap
  • Digital risk

To view the access options for this content please click here
Article
Publication date: 1 October 2018

Stylometric analysis of classical Arabic texts for genre detection

Maha Al-Yahya

In the context of information retrieval, text genre is as important as its content, and knowledge of the text genre enhances the search engine features by providing…

HTML
PDF (885 KB)

Abstract

Purpose

In the context of information retrieval, text genre is as important as its content, and knowledge of the text genre enhances the search engine features by providing customized retrieval. The purpose of this study is to explore and evaluate the use of stylometric analysis, a quantitative analysis for the linguistics features of text, to support the task of automated text genre detection for Classical Arabic text.

Design/methodology/approach

Unsupervised clustering and supervised classification were applied on the King Saud University Corpus of Classical Arabic texts (KSUCCA) using the most frequent words in the corpus (MFWs) as stylometric features. Four popular distance measures established in stylometric research are evaluated for the genre detection task.

Findings

The results of the experiments show that stylometry-based genre clustering and classification align well with human-defined genre. The evidence suggests that genre style signals exist for Classical Arabic and can be used to support the task of automated genre detection.

Originality/value

This work targets the task of genre detection in Classical Arabic text using stylometric features, an approach that has only been previously applied to Arabic authorship attribution. The study also provides a comparison of four distance measures used in stylomtreic analysis on the KSUCCA, a corpus with over 50 million words of Classical Arabic using clustering and classification.

Details

The Electronic Library, vol. 36 no. 5
Type: Research Article
DOI: https://doi.org/10.1108/EL-11-2017-0236
ISSN: 0264-0473

Keywords

  • Stylometric analysis
  • Genre detection
  • Classical arabic text
  • Distance measure

To view the access options for this content please click here
Book part
Publication date: 26 November 2020

Two Modern Aspects of Intangible Assets – Protection on Blockchain and Funding through ICO

Tatjana Horvat and Vito Bobek

Save Ideas Ltd is an Australia-based company and Internet portal for free and instant double protection of intellectual property (ideas of innovators and anyone), one with…

HTML
PDF (520 KB)
EPUB (25 KB)

Abstract

Save Ideas Ltd is an Australia-based company and Internet portal for free and instant double protection of intellectual property (ideas of innovators and anyone), one with the Time Certificate stamp and another one based on blockchain technology. Blockchain protection is being upgraded by Initial Coin Offering (ICO) with process of issuing own crypto tokens for the expansion of Save Ideas and at the same time for funding the most promising registered ideas. Process of ICO as the way of financing will be presented in the case of Save Ideas in this chapter.

Details

Managing Customer Experiences in an Omnichannel World: Melody of Online and Offline Environments in the Customer Journey
Type: Book
DOI: https://doi.org/10.1108/978-1-80043-388-520201021
ISBN: 978-1-80043-389-2

Keywords

  • Save Ideas
  • IP rights
  • blockchain
  • ICO
  • copyright
  • time-stamp record

To view the access options for this content please click here
Article
Publication date: 7 November 2016

A lexicon based approach for classifying Arabic multi-labeled text

Ismail Hmeidi, Mahmoud Al-Ayyoub, Nizar A. Mahyoub and Mohammed A. Shehab

Multi-label Text Classification (MTC) is one of the most recent research trends in data mining and information retrieval domains because of many reasons such as the rapid…

HTML
PDF (659 KB)

Abstract

Purpose

Multi-label Text Classification (MTC) is one of the most recent research trends in data mining and information retrieval domains because of many reasons such as the rapid growth of online data and the increasing tendency of internet users to be more comfortable with assigning multiple labels/tags to describe documents, emails, posts, etc. The dimensionality of labels makes MTC more difficult and challenging compared with traditional single-labeled text classification (TC). Because it is a natural extension of TC, several ways are proposed to benefit from the rich literature of TC through what is called problem transformation (PT) methods. Basically, PT methods transform the multi-label data into a single-label one that is suitable for traditional single-label classification algorithms. Another approach is to design novel classification algorithms customized for MTC. Over the past decade, several works have appeared on both approaches focusing mainly on the English language. This work aims to present an elaborate study of MTC of Arabic articles.

Design/methodology/approach

This paper presents a novel lexicon-based method for MTC, where the keywords that are most associated with each label are extracted from the training data along with a threshold that can later be used to determine whether each test document belongs to a certain label.

Findings

The experiments show that the presented approach outperforms the currently available approaches. Specifically, the results of our experiments show that the best accuracy obtained from existing approaches is only 18 per cent, whereas the accuracy of the presented lexicon-based approach can reach an accuracy level of 31 per cent.

Originality/value

Although there exist some tools that can be customized to address the MTC problem for Arabic text, their accuracies are very low when applied to Arabic articles. This paper presents a novel method for MTC. The experiments show that the presented approach outperforms the currently available approaches.

Details

International Journal of Web Information Systems, vol. 12 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/IJWIS-01-2016-0002
ISSN: 1744-0084

Keywords

  • Label-set dimensionality
  • Lexicon-based multi-label classification
  • ML-Accuracy
  • Multi-label data
  • Single-label data

To view the access options for this content please click here
Book part
Publication date: 14 August 2015

Dialogues of Authenticity

Laura A. Heymann

Artists operating under a studio model, such as Andy Warhol, have frequently been described as reducing their work to statements of authorship, indicated by the signature…

HTML
PDF (299 KB)
EPUB (64 KB)

Abstract

Artists operating under a studio model, such as Andy Warhol, have frequently been described as reducing their work to statements of authorship, indicated by the signature finally affixed to the work. By contrast, luxury goods manufacturers decry as inauthentic and counterfeit the handbags produced during off-shift hours using the same materials and craftsmanship as the authorized goods produced hours earlier. The distinction between authentic and inauthentic often turns on nothing more than a statement of authorship. Intellectual property law purports to value such statements of authenticity, but no statement has value unless it is accepted as valid by its audience, a determination that depends on shared notions of what authenticity means as well as a common understanding of what authenticity designates.

Details

Special Issue: Thinking and Rethinking Intellectual Property
Type: Book
DOI: https://doi.org/10.1108/S1059-433720150000067002
ISBN: 978-1-78441-881-6

Keywords

  • Copyright
  • trademark
  • authenticity
  • branding
  • intellectual property
  • audience

To view the access options for this content please click here
Article
Publication date: 24 June 2020

Buy one painting, get two names. On the valuation of artist collaborations in the art market

Anne-Sophie V. Radermecker

To analyze the market reception of multi-authored works of art through the lens of collaborative old master paintings (“formal/prestige collaboration”). This paper tests…

HTML
PDF (216 KB)

Abstract

Purpose

To analyze the market reception of multi-authored works of art through the lens of collaborative old master paintings (“formal/prestige collaboration”). This paper tests whether multi-authored attribution strategies (i.e. naming two artists as brand names) affect buyers' willingness to pay differently from single-authored works in the auction market.

Design/methodology/approach

This case study focuses on collaborative paintings by Flemish masters, based on a data set comprising 11,630 single-authored and collaborative paintings auctioned between 1946 and 2015. Hedonic regressions have been employed to test whether or not co-branded artworks are differently valued by buyers and how the reputation of each artist might influence valuation.

Findings

Despite the opportunity for buyers to purchase one artwork with two brand names, this study reveals that the average value of collaborative paintings is statistically lower than that of single-authored paintings. This is especially true when a reputed master was involved in the collaboration. The present findings suggest that the valuable characteristics of formal collaborations (i.e. double brand name, dual authorship and reputation, high-quality standards) are no longer perceived and valued as such by buyers, and that co-branding can affect the artist brand equity because of a contagion effect. We argue that integral authorship is more valued than partial authorship, suggesting that the myth of the artist as a lone genius is still well-anchored in purchasing habits.

Research limitations/implications

Prestige collaborations are a very particular form of early co-branding in the art world, with limited data available. Further research should consider larger samples to reiterate the analysis on other collaboration forms in order to challenge the current findings.

Practical implications

Researchers and living artists should be aware that brand building and co-branding are marketing strategies that may generate negative effects on prices in the art market. The perceived and market value of co-branded works are time-varying, and depends on both the context of reception of these works and the reputation of the artists at time t.

Originality/value

This market segment has never been considered in art market studies, although formal collaboration is one of the earliest documented forms of co-branding in the art world. This paper provides new empirical evidence from the auction market, based on buyers' willingness to pay, and it further highlights the reception of multi-authored art objects in Western art markets that particularly value individual creators.

Details

Arts and the Market, vol. 10 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/AAM-10-2019-0030
ISSN: 2056-4945

Keywords

  • Artist brand name
  • Co-branding
  • Buyers' preferences
  • Reputation
  • Hedonic regression

To view the access options for this content please click here
Article
Publication date: 6 June 2016

A decade of security research in ubiquitous computing: results of a systematic literature review

Ema Kusen and Mark Strembeck

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his…

HTML
PDF (1021 KB)

Abstract

Purpose

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.

Design/methodology/approach

The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.

Findings

Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.

Originality/value

To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/IJPCC-03-2016-0018
ISSN: 1742-7371

Keywords

  • Security
  • Ubiquitous computing

To view the access options for this content please click here
Book part
Publication date: 25 January 2021

The Who, Where and What of Value in the Art Market: Understanding the Authentic

Victoria Rodner and Chloe Preece

In the contemporary visual art market, for art to be valuable, it must be deemed authentic. In this chapter, we deconstruct the space within which the authentication of…

HTML
PDF (247 KB)
EPUB (6.4 MB)

Abstract

In the contemporary visual art market, for art to be valuable, it must be deemed authentic. In this chapter, we deconstruct the space within which the authentication of art takes place to understand the structural underpinnings of value and its ideological foundations. Through a three-part model, we demonstrate how authenticity in the art market, as a socially constructed concept, relies on the interpretation of cultural brokers who demonstrate recognition of the artist's vision in the work by placing it within an art context and thus legitimising it as culturally valuable. In our spatial analysis, we illustrate the complexity of visual art products and their valuation, demonstrating how authenticity operates through multiple dimensions. Ultimately, we demonstrate that authenticity is an autopoietic market practice which serves to further monopolise power.

Details

Exploring Cultural Value
Type: Book
DOI: https://doi.org/10.1108/978-1-78973-515-420211003
ISBN: 978-1-78973-515-4

Keywords

  • Artworld
  • Art market
  • Authenticity
  • Cultural brokers
  • Space/place
  • Value

To view the access options for this content please click here
Article
Publication date: 4 September 2009

From conceptual to perceptual reality: trust in digital repositories

Adolfo G. Prieto

Digital repositories offer a great benefit to people in a variety of settings, especially since an ever‐increasing amount of information is being gathered, transmitted…

HTML
PDF (113 KB)

Abstract

Purpose

Digital repositories offer a great benefit to people in a variety of settings, especially since an ever‐increasing amount of information is being gathered, transmitted, and preserved through various technologies. The purpose of this paper is to underscore trust as a critical element in the infrastructure of digital repositories and to look more closely at trusted digital repositories from the perspective of the user communities for which they are designed.

Design/methodology/approach

The paper looks to the literature in reviewing the concept of trust and its role in an online environment. Attention is then paid to trusted digital repositories, with close examination of the user communities’ perceptions of trust and the impact of these perceptions. Special attention is given to users within the academic community.

Findings

While digital repositories may be trustworthy because of adherence to technological standards, accepted practices, and mechanisms for authenticating the authorship and accuracy of their content, it is ultimately their respective stakeholders – both those who deposit and use content – whose perceptions play a central role in ensuring a digital repository's trustworthiness.

Research limitations/implications

A future empirical study would be beneficial in order to measure perceptions of trust as contributing factors to the trustworthiness of digital repositories.

Practical implications

This paper provides a useful resource for persons wishing to review the topic of trusted digital repositories or increase their awareness in this area.

Originality/value

This paper offers a focused look at various levels of trust as they relate to the dissemination of scholarly communication in the academic world, particularly through institutional repositories.

Details

Library Review, vol. 58 no. 8
Type: Research Article
DOI: https://doi.org/10.1108/00242530910987082
ISSN: 0024-2535

Keywords

  • Trust
  • Digital storage
  • User studies
  • Communities
  • Stakeholder analysis

Access
Only content I have access to
Only Open Access
Year
  • Last week (1)
  • Last month (2)
  • Last 3 months (3)
  • Last 6 months (4)
  • Last 12 months (8)
  • All dates (93)
Content type
  • Article (77)
  • Book part (14)
  • Earlycite article (2)
1 – 10 of 93
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here