Search results

11 – 20 of over 124000

Abstract

Details

Qualitative Research in the Study of Leadership
Type: Book
ISBN: 978-1-78560-651-9

Article
Publication date: 1 February 1967

James A. Tait

FOR CATALOGUERS, and librarians generally, 1967 will prove to be a vintage year, the annus mirabilis for the cataloguer, with the publication in January of the American text of…

Abstract

FOR CATALOGUERS, and librarians generally, 1967 will prove to be a vintage year, the annus mirabilis for the cataloguer, with the publication in January of the American text of the new Anglo‐American Code. The British text is expected to be published in November. The availability in this country of the American text gives some little time for a preview of the British version. The profession has had ample warning; the new code has had a long gestation period. For the Americans, especially, it is the culmination of many years of effort, from their preliminary second edition of the 1908 code in 1941, through the second edition of 1949, the Library of Congress Rules for Descriptive Cataloging of the same year, the Lubetzky Report of 1953, the Draft Code of 1960, to the Paris Principles of 1961. The present code owes very much to its predecessors, particularly the Paris Principles, which were in effect a set of guidelines agreed on internationally to ensure broad international consistency between any future national codes without spelling out the detailed rules. Except for one or two instances the new code follows the Paris Principles closely.

Details

Library Review, vol. 21 no. 2
Type: Research Article
ISSN: 0024-2535

Article
Publication date: 5 August 2014

Fei Xu

The purpose of this paper is to explore methods of producing Quick Response (QR) Code, its customization, artistic look and applications and elaborate the technique of generating…

1472

Abstract

Purpose

The purpose of this paper is to explore methods of producing Quick Response (QR) Code, its customization, artistic look and applications and elaborate the technique of generating QR Code for library bibliographic records.

Design/methodology/approach

Through literature review, the study explored methods of generating QR Code and its applications in academic libraries. Based on research work and implementation experience, an efficient procedure for generating QR Code for bibliographic records was developed.

Findings

The study identified methods of generating QR Code, its customization and applications, and established the technique of generating QR Code for library bibliographic records.

Originality/value

The study is expected to facilitate the growth of QR Code’s visibility and success, and its mainstream adoption. The technique of generating QR Code for library bibliographic records in the study should be instructive for similar projects.

Details

VINE, vol. 44 no. 3
Type: Research Article
ISSN: 0305-5728

Keywords

Article
Publication date: 26 July 2022

Deborah Silvis, Victor R. Lee, Jody Clarke-Midura and Jessica F. Shumway

Much remains unknown about how young children orient to computational objects and how we as learning scientists can orient to young children as computational thinkers. While some…

Abstract

Purpose

Much remains unknown about how young children orient to computational objects and how we as learning scientists can orient to young children as computational thinkers. While some research exists on how children learn programming, very little has been written about how they learn the technical skills needed to operate technologies or to fix breakdowns that occur in the code or the machine. The purpose of this study is to explore how children perform technical knowledge in tangible programming environments.

Design/methodology/approach

The current study examines the organization of young children’s technical knowledge in the context of a design-based study of Kindergarteners learning to code using robot coding toys, where groups of children collaboratively debugged programs. The authors conducted iterative rounds of qualitative coding of video recordings in kindergarten classrooms and interaction analysis of children using coding robots.

Findings

The authors found that as children repaired bugs at the level of the program and at the level of the physical apparatus, they were performing essential technical knowledge; the authors focus on how demonstrating technical knowledge was organized pedagogically and collectively achieved.

Originality/value

Drawing broadly from studies of the social organization of technical work in professional settings, we argue that technical knowledge is easy to overlook but essential for learning to repair programs. The authors suggest how tangible programming environments represent pedagogically important contexts for dis-embedding young children’s essential technical knowledge from the more abstract knowledge of programming.

Details

Information and Learning Sciences, vol. 123 no. 9/10
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 1 January 1990

Jeffrey N. Gatten

Massive bar coding projects require a great deal of planning and preparation, and usually involve most of a library's staff. The swift and efficient execution of the project is…

Abstract

Massive bar coding projects require a great deal of planning and preparation, and usually involve most of a library's staff. The swift and efficient execution of the project is paramount. While a large‐scale bar coding project can be intimidating, detailed planning can prevent hours of anxiety and the need for crisis management. This article attempts to provide a comprehensive overview of the relevant issues for a successful bar coding project. Selecting bar codes, planning and structuring a project, calculating time estimates, and maintaining staff morale are presented in detail. A selected bibliography provides access to more information.

Details

Library Hi Tech, vol. 8 no. 1
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 25 February 2020

Linda W. Lee, Amir Dabirian, Ian P. McCarthy and Jan Kietzmann

The purpose of this paper is to introduce, apply and compare how artificial intelligence (AI), and specifically the IBM Watson system, can be used for content analysis in…

2871

Abstract

Purpose

The purpose of this paper is to introduce, apply and compare how artificial intelligence (AI), and specifically the IBM Watson system, can be used for content analysis in marketing research relative to manual and computer-aided (non-AI) approaches to content analysis.

Design/methodology/approach

To illustrate the use of AI-enabled content analysis, this paper examines the text of leadership speeches, content related to organizational brand. The process and results of using AI are compared to manual and computer-aided approaches by using three performance factors for content analysis: reliability, validity and efficiency.

Findings

Relative to manual and computer-aided approaches, AI-enabled content analysis provides clear advantages with high reliability, high validity and moderate efficiency.

Research limitations/implications

This paper offers three contributions. First, it highlights the continued importance of the content analysis research method, particularly with the explosive growth of natural language-based user-generated content. Second, it provides a road map of how to use AI-enabled content analysis. Third, it applies and compares AI-enabled content analysis to manual and computer-aided, using leadership speeches.

Practical implications

For each of the three approaches, nine steps are outlined and described to allow for replicability of this study. The advantages and disadvantages of using AI for content analysis are discussed. Together these are intended to motivate and guide researchers to apply and develop AI-enabled content analysis for research in marketing and other disciplines.

Originality/value

To the best of the authors’ knowledge, this paper is among the first to introduce, apply and compare how AI can be used for content analysis.

Details

European Journal of Marketing, vol. 54 no. 3
Type: Research Article
ISSN: 0309-0566

Keywords

Content available
Article
Publication date: 23 June 2021

Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…

1335

Abstract

Purpose

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.

Design/methodology/approach

An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.

Findings

Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.

Practical implications

A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.

Originality/value

Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.

Article
Publication date: 16 August 2019

Jody Clarke-Midura, Victor R. Lee, Jessica F. Shumway and Megan M. Hamilton

This paper aims to be a think piece that promotes discussion around the design of coding toys for children. In particular, the authors examine three different toys that have some…

Abstract

Purpose

This paper aims to be a think piece that promotes discussion around the design of coding toys for children. In particular, the authors examine three different toys that have some sort of block-based coding interface. The authors juxtapose three different design features and the demands they place on young children learning to code. To examine the toys, the authors apply a framework developed based on Gibson’s theory of affordances and Palmer’s external representations. The authors look specifically at the toys: interface design, intended play scenario and representational conventions for computational ideas.

Design/methodology/approach

As a research team, the authors have been playing with toys, observing their own children play with the toys and using them in kindergarten classrooms. In this paper, the authors reflect specifically on the design of the toys and the demands they place on children.

Findings

The authors make no claims about whether one toy/design approach is superior to another. However, the differences that the authors articulate should serve as a provocation for researchers and designers to be mindful about what demands and expectations they place on young children as they learn to code and use code to learn in any given system.

Research limitations/implications

As mentioned above, the authors want to start a discussion about design of these toys and how they shape children's experience with coding.

Originality/value

There is a push to get coding and computational thinking into K-12, but there is not enough research on what this looks like in early childhood. Further, while research is starting to emerge on block-based programming vs text-based for older children and adults, little research has been done on the representational form of code for young children. The authors hope to start a discussion on design of coding toys for children.

Details

Information and Learning Sciences, vol. 120 no. 7/8
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 3 October 2016

Christabel M.F. Ho and Olugbenga Timo Oladinrin

Setting measurable criteria for implementing ethical codes is a pivotal issue in construction organizations. This paper aims to present an approach for evaluating ethical codes

1305

Abstract

Purpose

Setting measurable criteria for implementing ethical codes is a pivotal issue in construction organizations. This paper aims to present an approach for evaluating ethical codes implementation within an organization based on 30 indicators for effective implementation of codes of ethics, with the objective of enhancing employees’ ethical behaviour within the organization.

Design/methodology/approach

This study builds on a theoretical model that was developed using existing classification in the literature, including six processes of ethical codes implementation (process of: identification and removal of barriers, coding, internalization, enacting values, monitoring and accountability). The model was validated by applying partial least square structural equation modelling (PLS-SEM) estimation approach on questionnaire survey data which were collected from construction practitioners in Hong Kong. Fuzzy synthetic evaluation (FSE) analysis was adopted to assess the level of ethical code implementation.

Findings

The results of the PLS-SEM indicate a good model fit, and the model has a substantial predictive power and satisfactory model representation. Thus, the model is suitable for measuring or evaluating codes of ethics implementation within organization. The process of “enacting value” has the greatest influence on “ethical code implementation”. The results of FSE indicate that the overall level of implementation of ethical codes is high, but there are rooms for further improvement.

Research limitations/implications

The response to the self-assessment questionnaire used for measuring the extent of implementation is relatively low, but it was adequate for statistical analyses considering the fact that it represents the second stage of data collection in a longitudinal manner, and only the respondents who participated in the initial questionnaire survey were asked to participate. The essence of doing this is to test the model for the purpose of self-evaluation of construction organizations regarding codes implementation. Thus, the outcomes are not representative enough for the entire construction organizations in Hong Kong. However, the model was tested to demonstrate how to reflect the strengths and weaknesses of construction companies in Hong Kong with respects to ethical code implementation to identify areas requiring improvement.

Practical implications

Facilities managers can benefit from the findings of this study by applying the model to assess ethical codes implementation within the organization to enhance ethical behaviour.

Originality/value

The main contribution of this study is the generation of a framework for measuring the extent of implementation of ethical codes within construction organizations. The contribution from this study can add significant value to facilities management discipline as well, being a business-oriented sector. As ethical behaviour plays an important role in delivering various facilities. The approach used in this study is useful for facilities managers in the process of implementing codes of ethics.

Details

Facilities, vol. 34 no. 13/14
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 22 November 2011

Mariamma Chacko and K. Poulose Jacob

The purpose of this paper is to describe an approach towards code validation of RISC microcontrollers, which helps to automate software debugging. A static machine code analysis…

Abstract

Purpose

The purpose of this paper is to describe an approach towards code validation of RISC microcontrollers, which helps to automate software debugging. A static machine code analysis which checks the appropriateness of instructions in a sequence to identify any logical mistakes and also to identify redundant codes appearing in a program for the target processor is presented.

Design/methodology/approach

Validation is done with the help of rules of inferences formulated for the target processor. The rules govern the occurrence of illegitimate/out of place instructions and code sequences for executing the computational and integrated peripheral functions. The stipulated rules are encoded in propositional logic formulae and their compliance is tested in all possible execution paths of the application programs. An incorrect sequence of machine code pattern is identified using slicing techniques on the control flow graph generated from machine code.

Findings

The results explain that the technique is independent of compiler/assembler and contributes to early detection of software bugs that are otherwise hard to detect. Program states are identified mainly with machine code pattern, which drastically reduces the state space creation contributing to an improved state‐of‐the‐art model checking.

Research limitations/implications

Though the technique described is general, the implementation is highly architecture oriented, and hence the feasibility study is conducted only on PIC16F87X microcontrollers.

Practical implications

This validation tool can be integrated to the system development environment resulting in improved software quality and reduced debugging time.

Originality/value

It is a novel and original approach at machine code level applicable to a wide range of processors once appropriate rules are available.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 4 no. 4
Type: Research Article
ISSN: 1756-378X

Keywords

11 – 20 of over 124000