Search results
11 – 20 of over 124000FOR CATALOGUERS, and librarians generally, 1967 will prove to be a vintage year, the annus mirabilis for the cataloguer, with the publication in January of the American text of…
Abstract
FOR CATALOGUERS, and librarians generally, 1967 will prove to be a vintage year, the annus mirabilis for the cataloguer, with the publication in January of the American text of the new Anglo‐American Code. The British text is expected to be published in November. The availability in this country of the American text gives some little time for a preview of the British version. The profession has had ample warning; the new code has had a long gestation period. For the Americans, especially, it is the culmination of many years of effort, from their preliminary second edition of the 1908 code in 1941, through the second edition of 1949, the Library of Congress Rules for Descriptive Cataloging of the same year, the Lubetzky Report of 1953, the Draft Code of 1960, to the Paris Principles of 1961. The present code owes very much to its predecessors, particularly the Paris Principles, which were in effect a set of guidelines agreed on internationally to ensure broad international consistency between any future national codes without spelling out the detailed rules. Except for one or two instances the new code follows the Paris Principles closely.
The purpose of this paper is to explore methods of producing Quick Response (QR) Code, its customization, artistic look and applications and elaborate the technique of generating…
Abstract
Purpose
The purpose of this paper is to explore methods of producing Quick Response (QR) Code, its customization, artistic look and applications and elaborate the technique of generating QR Code for library bibliographic records.
Design/methodology/approach
Through literature review, the study explored methods of generating QR Code and its applications in academic libraries. Based on research work and implementation experience, an efficient procedure for generating QR Code for bibliographic records was developed.
Findings
The study identified methods of generating QR Code, its customization and applications, and established the technique of generating QR Code for library bibliographic records.
Originality/value
The study is expected to facilitate the growth of QR Code’s visibility and success, and its mainstream adoption. The technique of generating QR Code for library bibliographic records in the study should be instructive for similar projects.
Details
Keywords
Deborah Silvis, Victor R. Lee, Jody Clarke-Midura and Jessica F. Shumway
Much remains unknown about how young children orient to computational objects and how we as learning scientists can orient to young children as computational thinkers. While some…
Abstract
Purpose
Much remains unknown about how young children orient to computational objects and how we as learning scientists can orient to young children as computational thinkers. While some research exists on how children learn programming, very little has been written about how they learn the technical skills needed to operate technologies or to fix breakdowns that occur in the code or the machine. The purpose of this study is to explore how children perform technical knowledge in tangible programming environments.
Design/methodology/approach
The current study examines the organization of young children’s technical knowledge in the context of a design-based study of Kindergarteners learning to code using robot coding toys, where groups of children collaboratively debugged programs. The authors conducted iterative rounds of qualitative coding of video recordings in kindergarten classrooms and interaction analysis of children using coding robots.
Findings
The authors found that as children repaired bugs at the level of the program and at the level of the physical apparatus, they were performing essential technical knowledge; the authors focus on how demonstrating technical knowledge was organized pedagogically and collectively achieved.
Originality/value
Drawing broadly from studies of the social organization of technical work in professional settings, we argue that technical knowledge is easy to overlook but essential for learning to repair programs. The authors suggest how tangible programming environments represent pedagogically important contexts for dis-embedding young children’s essential technical knowledge from the more abstract knowledge of programming.
Details
Keywords
Massive bar coding projects require a great deal of planning and preparation, and usually involve most of a library's staff. The swift and efficient execution of the project is…
Abstract
Massive bar coding projects require a great deal of planning and preparation, and usually involve most of a library's staff. The swift and efficient execution of the project is paramount. While a large‐scale bar coding project can be intimidating, detailed planning can prevent hours of anxiety and the need for crisis management. This article attempts to provide a comprehensive overview of the relevant issues for a successful bar coding project. Selecting bar codes, planning and structuring a project, calculating time estimates, and maintaining staff morale are presented in detail. A selected bibliography provides access to more information.
Linda W. Lee, Amir Dabirian, Ian P. McCarthy and Jan Kietzmann
The purpose of this paper is to introduce, apply and compare how artificial intelligence (AI), and specifically the IBM Watson system, can be used for content analysis in…
Abstract
Purpose
The purpose of this paper is to introduce, apply and compare how artificial intelligence (AI), and specifically the IBM Watson system, can be used for content analysis in marketing research relative to manual and computer-aided (non-AI) approaches to content analysis.
Design/methodology/approach
To illustrate the use of AI-enabled content analysis, this paper examines the text of leadership speeches, content related to organizational brand. The process and results of using AI are compared to manual and computer-aided approaches by using three performance factors for content analysis: reliability, validity and efficiency.
Findings
Relative to manual and computer-aided approaches, AI-enabled content analysis provides clear advantages with high reliability, high validity and moderate efficiency.
Research limitations/implications
This paper offers three contributions. First, it highlights the continued importance of the content analysis research method, particularly with the explosive growth of natural language-based user-generated content. Second, it provides a road map of how to use AI-enabled content analysis. Third, it applies and compares AI-enabled content analysis to manual and computer-aided, using leadership speeches.
Practical implications
For each of the three approaches, nine steps are outlined and described to allow for replicability of this study. The advantages and disadvantages of using AI for content analysis are discussed. Together these are intended to motivate and guide researchers to apply and develop AI-enabled content analysis for research in marketing and other disciplines.
Originality/value
To the best of the authors’ knowledge, this paper is among the first to introduce, apply and compare how AI can be used for content analysis.
Details
Keywords
Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…
Abstract
Purpose
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.
Design/methodology/approach
An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.
Findings
Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.
Practical implications
A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.
Originality/value
Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.
Details
Keywords
- Software development
- Blockchain
- Cybersecurity
- Operational flight program
- Secure development environment
- Secure virtual machine
- Zero trust
- Embedded systems
- Mission-critical systems
- OFP
- DevOps
- DevSecOps
- Software support activity
- SSA
- SDE
- Permissioned blockchain
- Cryptocurrency
- Time-limited authorization for developer action
- TADA
- Code signing
- Trusted software guard
- SGX
- Trusted eXecution technology
- TXT
- Trusted platform module
- Self-hosting
- Controlled access blockchain
- CABlock
- Role-based access control
- RBAC
Jody Clarke-Midura, Victor R. Lee, Jessica F. Shumway and Megan M. Hamilton
This paper aims to be a think piece that promotes discussion around the design of coding toys for children. In particular, the authors examine three different toys that have some…
Abstract
Purpose
This paper aims to be a think piece that promotes discussion around the design of coding toys for children. In particular, the authors examine three different toys that have some sort of block-based coding interface. The authors juxtapose three different design features and the demands they place on young children learning to code. To examine the toys, the authors apply a framework developed based on Gibson’s theory of affordances and Palmer’s external representations. The authors look specifically at the toys: interface design, intended play scenario and representational conventions for computational ideas.
Design/methodology/approach
As a research team, the authors have been playing with toys, observing their own children play with the toys and using them in kindergarten classrooms. In this paper, the authors reflect specifically on the design of the toys and the demands they place on children.
Findings
The authors make no claims about whether one toy/design approach is superior to another. However, the differences that the authors articulate should serve as a provocation for researchers and designers to be mindful about what demands and expectations they place on young children as they learn to code and use code to learn in any given system.
Research limitations/implications
As mentioned above, the authors want to start a discussion about design of these toys and how they shape children's experience with coding.
Originality/value
There is a push to get coding and computational thinking into K-12, but there is not enough research on what this looks like in early childhood. Further, while research is starting to emerge on block-based programming vs text-based for older children and adults, little research has been done on the representational form of code for young children. The authors hope to start a discussion on design of coding toys for children.
Details
Keywords
Christabel M.F. Ho and Olugbenga Timo Oladinrin
Setting measurable criteria for implementing ethical codes is a pivotal issue in construction organizations. This paper aims to present an approach for evaluating ethical codes…
Abstract
Purpose
Setting measurable criteria for implementing ethical codes is a pivotal issue in construction organizations. This paper aims to present an approach for evaluating ethical codes implementation within an organization based on 30 indicators for effective implementation of codes of ethics, with the objective of enhancing employees’ ethical behaviour within the organization.
Design/methodology/approach
This study builds on a theoretical model that was developed using existing classification in the literature, including six processes of ethical codes implementation (process of: identification and removal of barriers, coding, internalization, enacting values, monitoring and accountability). The model was validated by applying partial least square structural equation modelling (PLS-SEM) estimation approach on questionnaire survey data which were collected from construction practitioners in Hong Kong. Fuzzy synthetic evaluation (FSE) analysis was adopted to assess the level of ethical code implementation.
Findings
The results of the PLS-SEM indicate a good model fit, and the model has a substantial predictive power and satisfactory model representation. Thus, the model is suitable for measuring or evaluating codes of ethics implementation within organization. The process of “enacting value” has the greatest influence on “ethical code implementation”. The results of FSE indicate that the overall level of implementation of ethical codes is high, but there are rooms for further improvement.
Research limitations/implications
The response to the self-assessment questionnaire used for measuring the extent of implementation is relatively low, but it was adequate for statistical analyses considering the fact that it represents the second stage of data collection in a longitudinal manner, and only the respondents who participated in the initial questionnaire survey were asked to participate. The essence of doing this is to test the model for the purpose of self-evaluation of construction organizations regarding codes implementation. Thus, the outcomes are not representative enough for the entire construction organizations in Hong Kong. However, the model was tested to demonstrate how to reflect the strengths and weaknesses of construction companies in Hong Kong with respects to ethical code implementation to identify areas requiring improvement.
Practical implications
Facilities managers can benefit from the findings of this study by applying the model to assess ethical codes implementation within the organization to enhance ethical behaviour.
Originality/value
The main contribution of this study is the generation of a framework for measuring the extent of implementation of ethical codes within construction organizations. The contribution from this study can add significant value to facilities management discipline as well, being a business-oriented sector. As ethical behaviour plays an important role in delivering various facilities. The approach used in this study is useful for facilities managers in the process of implementing codes of ethics.
Details
Keywords
Mariamma Chacko and K. Poulose Jacob
The purpose of this paper is to describe an approach towards code validation of RISC microcontrollers, which helps to automate software debugging. A static machine code analysis…
Abstract
Purpose
The purpose of this paper is to describe an approach towards code validation of RISC microcontrollers, which helps to automate software debugging. A static machine code analysis which checks the appropriateness of instructions in a sequence to identify any logical mistakes and also to identify redundant codes appearing in a program for the target processor is presented.
Design/methodology/approach
Validation is done with the help of rules of inferences formulated for the target processor. The rules govern the occurrence of illegitimate/out of place instructions and code sequences for executing the computational and integrated peripheral functions. The stipulated rules are encoded in propositional logic formulae and their compliance is tested in all possible execution paths of the application programs. An incorrect sequence of machine code pattern is identified using slicing techniques on the control flow graph generated from machine code.
Findings
The results explain that the technique is independent of compiler/assembler and contributes to early detection of software bugs that are otherwise hard to detect. Program states are identified mainly with machine code pattern, which drastically reduces the state space creation contributing to an improved state‐of‐the‐art model checking.
Research limitations/implications
Though the technique described is general, the implementation is highly architecture oriented, and hence the feasibility study is conducted only on PIC16F87X microcontrollers.
Practical implications
This validation tool can be integrated to the system development environment resulting in improved software quality and reduced debugging time.
Originality/value
It is a novel and original approach at machine code level applicable to a wide range of processors once appropriate rules are available.
Details