Search results
1 – 10 of over 58000The degree to which a text is considered readable depends on the capability of the reader. This assumption puts different information retrieval systems at the risk of retrieving…
Abstract
Purpose
The degree to which a text is considered readable depends on the capability of the reader. This assumption puts different information retrieval systems at the risk of retrieving unreadable or hard-to-be-read yet relevant documents for their users. This paper aims to examine the potential use of concept-based readability measures along with classic measures for re-ranking search results in information retrieval systems, specifically in the Persian language.
Design/methodology/approach
Flesch–Dayani as a classic readability measure along with document scope (DS) and document cohesion (DC) as domain-specific measures have been applied for scoring the retrieved documents from Google (181 documents) and the RICeST database (215 documents) in the field of computer science and information technology (IT). The re-ranked result has been compared with the ranking of potential users regarding their readability.
Findings
The results show that there is a difference among subcategories of the computer science and IT field according to their readability and understandability. This study also shows that it is possible to develop a hybrid score based on DS and DC measures and, among all four applied scores in re-ranking the documents, the re-ranked list of documents based on the DSDC score shows correlation with re-ranking of the participants in both groups.
Practical implications
The findings of this study would foster a new option in re-ranking search results based on their difficulty for experts and non-experts in different fields.
Originality/value
The findings and the two-mode re-ranking model proposed in this paper along with its primary focus on domain-specific readability in the Persian language would help Web search engines and online databases in further refining the search results in pursuit of retrieving useful texts for users with differing expertise.
Details
Keywords
A simple notation for describing the internal structure of a document is presented, and contrasted with other, more conventional notations for describing documents, in particular…
Abstract
A simple notation for describing the internal structure of a document is presented, and contrasted with other, more conventional notations for describing documents, in particular those related to subject‐classification systems and document description for bibliographic purposes, as well as with document metalanguage codes such as those of SGML. It is suggested such a notation should assist the science of human messaging through (1) permitting hypotheses to be more readily expressed and/or tested concerning document structure, and (2) facilitating the formation of taxonomies of documents based on their structures. Such a notation should also be of practical value in contributing to the processes of document specification, building and testing, and possibly also contribute to new generations of IR systems which link retrieval against record databases to the search systems internal to specific documents. It is suggested that, following formative criticism, professional standards for describing document structure should be sought based on the notation. The notation is at present limited to linear documents, but extensions to it to accommodate documents in non‐linear form (e.g. hypertext documents) and/or existing in physically distributed form, could usefully be constructed. Examples of the application of the notation are provided.
This paper aims to analyse the research contributions of the Kingdom of Saudi Arabia in the field of applied linguistics (AL) indexed in the Web of Science core collection for the…
Abstract
Purpose
This paper aims to analyse the research contributions of the Kingdom of Saudi Arabia in the field of applied linguistics (AL) indexed in the Web of Science core collection for the period between 2011 and 2020.
Design/methodology/approach
The author searched key terms in the Social Science Citation Index and Science Citation Index Expanded categories that publish documents in AL. The author compiled the data, classified these documents according to their research focus and investigated different metrics such as keywords analysis, citation analysis, overseas collaboration and productivity over authors, institutions and sources by using VOSviewer and Excel sheet.
Findings
Results found that publications in Saudi Arabia have tremendously increased around three times in the years 2016–2020 than before. As unexpected, highly cited researchers, sources and institutions for the social science and arts and humanities disciplines were higher than the scientific disciplines that investigated linguistic issues such as neurology, audiology and computer science. The area of language teaching and learning was the most researched area in which the highly cited author, journals and keywords analysis metrics occurred within its scope. The highly cited articles were those that collaborated with the world contributing authors and acted as corresponding authors.
Originality/value
The study contributes to the body of literature of AL which shares other categories that investigated language as a central issue. The study provides a fine-grained picture about the research productivity of AL in scientific and social science categories in Saudi Arabia.
Details
Keywords
Timothy G. Hawkins, Michael J. Gravier and Suman Niranjan
The purpose of this study is to better understand the effectiveness of buyers’ defensive measures to thwart bid protests in government procurements.
Abstract
Purpose
The purpose of this study is to better understand the effectiveness of buyers’ defensive measures to thwart bid protests in government procurements.
Design/methodology/approach
A sample of 240 sourcing professionals concerning government source selections is used to analyze a logistic regression model exploring 6 antecedents of bid protests.
Findings
This research implicates the importance of oral presentations of offers, the type of value procured (i.e. services), protest experience, the quantity of document revisions, transaction costs and cost reimbursement contracts in receiving a bid protest.
Originality/value
To the best of the authors’ knowledge, this research is the first to explore sourcing strategy decisions that can contribute to the receipt of a bid protest. It adds clarity to an understudied market of business – the public sector.
Details
Keywords
John P. Nowak, Thomas A. Zaccaro and Katherine K. Solomon
The purpose of this article is to highlight a recent settlement by the United States Securities and Exchange Commission (the “SEC”) in which it alleged that a regulated entity…
Abstract
Purpose
The purpose of this article is to highlight a recent settlement by the United States Securities and Exchange Commission (the “SEC”) in which it alleged that a regulated entity failed to supervise a representative principally because the entity did not establish clear guidance as to how its personnel should investigate red flags of a representative’s potential misconduct (e.g., how to follow up on the red flags and define the scope of any inquiry).
Design/methodology/approach
This article provides an overview of failure-to-supervise liability for broker-dealers and investment advisers, and highlights key takeaways from the SEC’s recent enforcement resolution that may be applied in establishing compliance procedures relating to internal investigations going forward.
Findings
The article concludes that the SEC appears to expect regulated entities to implement procedures guiding employees on “how to investigate” suspicious activity. Companies, however, should define such procedures in general terms to allow for flexibility in investigations, which can present unique or unforeseen situations. Internal procedures must also account for and preserve attorney-client privilege and attorney work product protections.
Originality/value
This article provides expert analysis and practical guidance from experienced lawyers in the Investigations and White Collar Defense and Securities Enforcement practices
Details
Keywords
The Alex Catalogue of Electronic Texts is a collection of digital documents. The scope of documents in the collection includes items from American literature, English literature…
Abstract
The Alex Catalogue of Electronic Texts is a collection of digital documents. The scope of documents in the collection includes items from American literature, English literature, and Western philosophy.
This paper presents the results of a number of experiments performed at the National Archives, all related to the theme of linking collections of records. This paper aims to…
Abstract
Purpose
This paper presents the results of a number of experiments performed at the National Archives, all related to the theme of linking collections of records. This paper aims to present a methodology for translating a hierarchy into a network structure using a number of methods for deriving statistical distributions from records metadata or content and then aggregating them. Simple similarity metrics are then used to compare and link, collections of records with similar characteristics.
Design/methodology/approach
The approach taken is to consider a record at any level of the catalogue hierarchy as a summary of its children. A distribution for each child record is created (e.g. word counts and date distribution) and averaged/summed with the other children. This process is repeated up the hierarchy to find a representative distribution of the whole series. By doing this the authors can compare record series together and create a similarity network.
Findings
The summarising method was found to be applicable not only to a hierarchical catalogue but also to web archive data, which is by nature stored in a hierarchical folder structure. The case studies raised many questions worthy of further exploration such as how to present distributions and uncertainty to users and how to compare methods, which produce similarity scores on different scales.
Originality/value
Although the techniques used to create distributions such as topic modelling and word frequency counts, are not new and have been used to compare documents, to the best of the knowledge applying the averaging approach to the archival catalogue is new. This provides an interesting method for zooming in and out of a collection, creating networks at different levels of granularity according to user needs.
Details
Keywords
Stefano De Paoli and Jason Johnstone
This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…
Abstract
Purpose
This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.
Design/methodology/approach
The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.
Findings
The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.
Originality/value
This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.
Details
Keywords
Describes, through practical recent experiences, an approach toimplementing policies, standards and procedures in a large commercialenterprise. Presents an outline of a guide for…
Abstract
Describes, through practical recent experiences, an approach to implementing policies, standards and procedures in a large commercial enterprise. Presents an outline of a guide for those considering the long haul associated with such a major undertaking.
Details
Keywords
Chris Akroyd, Sharlene Sheetal Narayan Biswas and Sharon Chuang
This paper examines how the management control practices of organization members enable the alignment of product development projects with potentially conflicting corporate…
Abstract
Purpose
This paper examines how the management control practices of organization members enable the alignment of product development projects with potentially conflicting corporate strategies during the product development process.
Methodology/approach
Using an ethnomethodology informed research approach, we carry out a case study of an innovative New Zealand food company. Case study data included an internal company document, interviews with organization members, and an external market analysis document.
Findings
Our case study company had both sales growth and profit growth corporate strategies which have been argued to cause tensions. We found that four management control practices enabled the alignment of product development projects to these strategies. The first management control practice was having the NPD and marketing functions responsible for different corporate strategies. Other management control practices included the involvement of organization members from across multiple functions, the activities they carried out, and the measures used to evaluate project performance during the product development process.
Research limitations/implications
These findings add new insights to the management accounting literature by showing how a combination of management control practices can be used by organization members to align projects with potentially conflicting corporate strategies during the product development process.
Practical implications
While the alignment of product development projects to corporate strategy is not easy this study shows how it can be enabled through a number of management control practices.
Originality/value
We contribute to the management accounting research in this area by extending our understanding of the management control practices used during the product development process.
Details