Search results

1 – 10 of over 58000
Article
Publication date: 14 May 2018

Sholeh Arastoopoor

The degree to which a text is considered readable depends on the capability of the reader. This assumption puts different information retrieval systems at the risk of retrieving…

Abstract

Purpose

The degree to which a text is considered readable depends on the capability of the reader. This assumption puts different information retrieval systems at the risk of retrieving unreadable or hard-to-be-read yet relevant documents for their users. This paper aims to examine the potential use of concept-based readability measures along with classic measures for re-ranking search results in information retrieval systems, specifically in the Persian language.

Design/methodology/approach

Flesch–Dayani as a classic readability measure along with document scope (DS) and document cohesion (DC) as domain-specific measures have been applied for scoring the retrieved documents from Google (181 documents) and the RICeST database (215 documents) in the field of computer science and information technology (IT). The re-ranked result has been compared with the ranking of potential users regarding their readability.

Findings

The results show that there is a difference among subcategories of the computer science and IT field according to their readability and understandability. This study also shows that it is possible to develop a hybrid score based on DS and DC measures and, among all four applied scores in re-ranking the documents, the re-ranked list of documents based on the DSDC score shows correlation with re-ranking of the participants in both groups.

Practical implications

The findings of this study would foster a new option in re-ranking search results based on their difficulty for experts and non-experts in different fields.

Originality/value

The findings and the two-mode re-ranking model proposed in this paper along with its primary focus on domain-specific readability in the Persian language would help Web search engines and online databases in further refining the search results in pursuit of retrieving useful texts for users with differing expertise.

Article
Publication date: 1 April 1995

M.H. HEINE

A simple notation for describing the internal structure of a document is presented, and contrasted with other, more conventional notations for describing documents, in particular…

55

Abstract

A simple notation for describing the internal structure of a document is presented, and contrasted with other, more conventional notations for describing documents, in particular those related to subject‐classification systems and document description for bibliographic purposes, as well as with document metalanguage codes such as those of SGML. It is suggested such a notation should assist the science of human messaging through (1) permitting hypotheses to be more readily expressed and/or tested concerning document structure, and (2) facilitating the formation of taxonomies of documents based on their structures. Such a notation should also be of practical value in contributing to the processes of document specification, building and testing, and possibly also contribute to new generations of IR systems which link retrieval against record databases to the search systems internal to specific documents. It is suggested that, following formative criticism, professional standards for describing document structure should be sought based on the notation. The notation is at present limited to linear documents, but extensions to it to accommodate documents in non‐linear form (e.g. hypertext documents) and/or existing in physically distributed form, could usefully be constructed. Examples of the application of the notation are provided.

Details

Journal of Documentation, vol. 51 no. 4
Type: Research Article
ISSN: 0022-0418

Article
Publication date: 29 October 2021

Mohammed Ali Mohsen

This paper aims to analyse the research contributions of the Kingdom of Saudi Arabia in the field of applied linguistics (AL) indexed in the Web of Science core collection for the…

Abstract

Purpose

This paper aims to analyse the research contributions of the Kingdom of Saudi Arabia in the field of applied linguistics (AL) indexed in the Web of Science core collection for the period between 2011 and 2020.

Design/methodology/approach

The author searched key terms in the Social Science Citation Index and Science Citation Index Expanded categories that publish documents in AL. The author compiled the data, classified these documents according to their research focus and investigated different metrics such as keywords analysis, citation analysis, overseas collaboration and productivity over authors, institutions and sources by using VOSviewer and Excel sheet.

Findings

Results found that publications in Saudi Arabia have tremendously increased around three times in the years 2016–2020 than before. As unexpected, highly cited researchers, sources and institutions for the social science and arts and humanities disciplines were higher than the scientific disciplines that investigated linguistic issues such as neurology, audiology and computer science. The area of language teaching and learning was the most researched area in which the highly cited author, journals and keywords analysis metrics occurred within its scope. The highly cited articles were those that collaborated with the world contributing authors and acted as corresponding authors.

Originality/value

The study contributes to the body of literature of AL which shares other categories that investigated language as a central issue. The study provides a fine-grained picture about the research productivity of AL in scientific and social science categories in Saudi Arabia.

Article
Publication date: 29 July 2021

Timothy G. Hawkins, Michael J. Gravier and Suman Niranjan

The purpose of this study is to better understand the effectiveness of buyers’ defensive measures to thwart bid protests in government procurements.

Abstract

Purpose

The purpose of this study is to better understand the effectiveness of buyers’ defensive measures to thwart bid protests in government procurements.

Design/methodology/approach

A sample of 240 sourcing professionals concerning government source selections is used to analyze a logistic regression model exploring 6 antecedents of bid protests.

Findings

This research implicates the importance of oral presentations of offers, the type of value procured (i.e. services), protest experience, the quantity of document revisions, transaction costs and cost reimbursement contracts in receiving a bid protest.

Originality/value

To the best of the authors’ knowledge, this research is the first to explore sourcing strategy decisions that can contribute to the receipt of a bid protest. It adds clarity to an understudied market of business – the public sector.

Details

Journal of Business & Industrial Marketing, vol. 37 no. 4
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 23 July 2019

John P. Nowak, Thomas A. Zaccaro and Katherine K. Solomon

The purpose of this article is to highlight a recent settlement by the United States Securities and Exchange Commission (the “SEC”) in which it alleged that a regulated entity…

Abstract

Purpose

The purpose of this article is to highlight a recent settlement by the United States Securities and Exchange Commission (the “SEC”) in which it alleged that a regulated entity failed to supervise a representative principally because the entity did not establish clear guidance as to how its personnel should investigate red flags of a representative’s potential misconduct (e.g., how to follow up on the red flags and define the scope of any inquiry).

Design/methodology/approach

This article provides an overview of failure-to-supervise liability for broker-dealers and investment advisers, and highlights key takeaways from the SEC’s recent enforcement resolution that may be applied in establishing compliance procedures relating to internal investigations going forward.

Findings

The article concludes that the SEC appears to expect regulated entities to implement procedures guiding employees on “how to investigate” suspicious activity. Companies, however, should define such procedures in general terms to allow for flexibility in investigations, which can present unique or unforeseen situations. Internal procedures must also account for and preserve attorney-client privilege and attorney work product protections.

Originality/value

This article provides expert analysis and practical guidance from experienced lawyers in the Investigations and White Collar Defense and Securities Enforcement practices

Details

Journal of Investment Compliance, vol. 20 no. 2
Type: Research Article
ISSN: 1528-5812

Keywords

Article
Publication date: 1 May 1998

The Alex Catalogue of Electronic Texts is a collection of digital documents. The scope of documents in the collection includes items from American literature, English literature…

Abstract

The Alex Catalogue of Electronic Texts is a collection of digital documents. The scope of documents in the collection includes items from American literature, English literature, and Western philosophy.

Details

The Electronic Library, vol. 16 no. 5
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 July 2020

Mark Bell

This paper presents the results of a number of experiments performed at the National Archives, all related to the theme of linking collections of records. This paper aims to…

Abstract

Purpose

This paper presents the results of a number of experiments performed at the National Archives, all related to the theme of linking collections of records. This paper aims to present a methodology for translating a hierarchy into a network structure using a number of methods for deriving statistical distributions from records metadata or content and then aggregating them. Simple similarity metrics are then used to compare and link, collections of records with similar characteristics.

Design/methodology/approach

The approach taken is to consider a record at any level of the catalogue hierarchy as a summary of its children. A distribution for each child record is created (e.g. word counts and date distribution) and averaged/summed with the other children. This process is repeated up the hierarchy to find a representative distribution of the whole series. By doing this the authors can compare record series together and create a similarity network.

Findings

The summarising method was found to be applicable not only to a hierarchical catalogue but also to web archive data, which is by nature stored in a hierarchical folder structure. The case studies raised many questions worthy of further exploration such as how to present distributions and uncertainty to users and how to compare methods, which produce similarity scores on different scales.

Originality/value

Although the techniques used to create distributions such as topic modelling and word frequency counts, are not new and have been used to compare documents, to the best of the knowledge applying the averaging approach to the archival catalogue is new. This provides an interesting method for zooming in and out of a collection, creating networks at different levels of granularity according to user needs.

Details

Records Management Journal, vol. 30 no. 3
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 10 October 2023

Stefano De Paoli and Jason Johnstone

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…

Abstract

Purpose

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.

Design/methodology/approach

The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.

Findings

The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.

Originality/value

This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 August 1995

Barry Moule and Lina Giavara

Describes, through practical recent experiences, an approach toimplementing policies, standards and procedures in a large commercialenterprise. Presents an outline of a guide for…

2376

Abstract

Describes, through practical recent experiences, an approach to implementing policies, standards and procedures in a large commercial enterprise. Presents an outline of a guide for those considering the long haul associated with such a major undertaking.

Details

Information Management & Computer Security, vol. 3 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 29 March 2016

Chris Akroyd, Sharlene Sheetal Narayan Biswas and Sharon Chuang

This paper examines how the management control practices of organization members enable the alignment of product development projects with potentially conflicting corporate…

Abstract

Purpose

This paper examines how the management control practices of organization members enable the alignment of product development projects with potentially conflicting corporate strategies during the product development process.

Methodology/approach

Using an ethnomethodology informed research approach, we carry out a case study of an innovative New Zealand food company. Case study data included an internal company document, interviews with organization members, and an external market analysis document.

Findings

Our case study company had both sales growth and profit growth corporate strategies which have been argued to cause tensions. We found that four management control practices enabled the alignment of product development projects to these strategies. The first management control practice was having the NPD and marketing functions responsible for different corporate strategies. Other management control practices included the involvement of organization members from across multiple functions, the activities they carried out, and the measures used to evaluate project performance during the product development process.

Research limitations/implications

These findings add new insights to the management accounting literature by showing how a combination of management control practices can be used by organization members to align projects with potentially conflicting corporate strategies during the product development process.

Practical implications

While the alignment of product development projects to corporate strategy is not easy this study shows how it can be enabled through a number of management control practices.

Originality/value

We contribute to the management accounting research in this area by extending our understanding of the management control practices used during the product development process.

1 – 10 of over 58000