Search results

1 – 5 of 5
Open Access
Article
Publication date: 30 January 2012

Daniela Lydia Krause, Elif Weidinger, Judith Matz, Agnes Wildenauer, Jenny Katharina Wagner, Michael Obermeier, Michael Riedel, Hans-Jürgen Möller and Norbert Müller

There are several infectious agents in the environment that can cause persistent infections in the host. They usually cause their symptoms shortly after first infection and later…

Abstract

There are several infectious agents in the environment that can cause persistent infections in the host. They usually cause their symptoms shortly after first infection and later persist as silent viruses and bacteria within the body. However, these chronic infections may play an important role in the pathogenesis of schizophrenia and Tourette's syndrome (TS). We investigated the distribution of different neurotrophic infectious agents in TS, schizophrenia and controls. A total of 93 individuals were included (schizophrenic patients, Tourette patients and controls). We evaluated antibodies against cytomegalovirus (CMV), herpes-simplex virus (HSV), Epstein-Barr virus, Toxoplasma, Mycoplasma and Chlamydia trachomatis/pneumoniae. By comparing schizophrenia and TS, we found a higher prevalence of HSV (P=0.017) and CMV (P=0.017) antibodies in schizophrenic patients. Considering the relationship between schizophrenia, TS and healthy controls, we showed that there are associations for Chlamydia trachomatis (P=0.007), HSV (P=0.027) and CMV (P=0.029). When all measured viruses, bacteria and protozoa were combined, schizophrenic patients had a higher rate of antibodies to infectious agents than TS patients (P=0.049). Tourette and schizophrenic patients show a different vulnerability to infectious agents. Schizophrenic patients were found to have a higher susceptibility to viral infections than individuals with TS. This finding might point to a modification in special immune parameters in these diseases.

Details

Mental Illness, vol. 4 no. 1
Type: Research Article
ISSN: 2036-7465

Keywords

Open Access
Article
Publication date: 30 October 2023

Giacomo Pigatto, John Dumay, Lino Cinquini and Andrea Tenucci

This research aims to examine and understand the rationales and modalities behind the use of disclosure before, during and after a corporate governance scandal involving CPA…

Abstract

Purpose

This research aims to examine and understand the rationales and modalities behind the use of disclosure before, during and after a corporate governance scandal involving CPA Australia (CPAA).

Design/methodology/approach

Data beyond CPAA's annual reports were collected, such as news articles, media releases, an independent review panel (IRP) report, and the Chief Operating Officer's letter to members. These disclosures were manually coded and analysed through the word counts and word trees in NVivo. This study also relied on Norbert Elias' conceptual tool of power games among networks of actors – figurations – to model the scandal as a power game between the old Board, the press, concerned members, the IRP and the new Board. This study analysed the data to reveal a collective and in fieri power balance that changed with the phases of the scandal.

Findings

A mix of voluntary, involuntary, requested and absent disclosures was important in triggering, managing and ending the CPAA scandal. Moreover, communication and disclosure fulfilled a constitutive role since both: mobilised actors, enabled coordination among actors, contributed to pursuing shared goals and influenced power balances. Such a constitutive role was at the heart of the ability of coalitions of figurations to challenge and restore the powerful status quo.

Originality/value

This research introduces to accounting studies the collective and in fieri dimensions of power from figurational theory. Moreover, the research sheds new light on using voluntary, involuntary, requested and absent disclosures before, during and after a corporate crisis.

Details

Accounting, Auditing & Accountability Journal, vol. 36 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Open Access
Article
Publication date: 15 January 2020

Tim Gorichanaz, Jonathan Furner, Lai Ma, David Bawden, Lyn Robinson, Dominic Dixon, Ken Herold, Sille Obelitz Søe, Betsy Van der Veer Martens and Luciano Floridi

The purpose of this paper is to review and discuss Luciano Floridi’s 2019 book The Logic of Information: A Theory of Philosophy as Conceptual Design, the latest instalment in his…

3878

Abstract

Purpose

The purpose of this paper is to review and discuss Luciano Floridi’s 2019 book The Logic of Information: A Theory of Philosophy as Conceptual Design, the latest instalment in his philosophy of information (PI) tetralogy, particularly with respect to its implications for library and information studies (LIS).

Design/methodology/approach

Nine scholars with research interests in philosophy and LIS read and responded to the book, raising critical and heuristic questions in the spirit of scholarly dialogue. Floridi responded to these questions.

Findings

Floridi’s PI, including this latest publication, is of interest to LIS scholars, and much insight can be gained by exploring this connection. It seems also that LIS has the potential to contribute to PI’s further development in some respects.

Research limitations/implications

Floridi’s PI work is technical philosophy for which many LIS scholars do not have the training or patience to engage with, yet doing so is rewarding. This suggests a role for translational work between philosophy and LIS.

Originality/value

The book symposium format, not yet seen in LIS, provides forum for sustained, multifaceted and generative dialogue around ideas.

Details

Journal of Documentation, vol. 76 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 15 February 2024

Pertti Vakkari

The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the…

Abstract

Purpose

The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the organization of sciences and Fuchs’ (1993) theory about scientific change.

Design/methodology/approach

The study combines historical source analysis with conceptual and theoretical analysis for characterizing LIS. An attempt is made to empirically validate the distinction between LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.

Findings

The origin of fragmentation in LIS due the contributions of other disciplines can be traced in the 1960s and 1970s for solving the problems produced by the growth of scientific literature. Computer science and business established academic programs and started research relevant to LIS community focusing on information retrieval and bibliometrics. This has led to differing research interests between LIS and other disciplines concerning research topics and methods. LIS has been characterized as fragmented adhocracy as a whole, but we make a distinction between research topics LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.

Originality/value

The paper provides an elaborated historical perspective on the fragmentation of LIS in the pressure of other disciplines. It also characterizes LIS as discipline in a fresh way by applying Whitley’s (1984) theory.

Details

Journal of Documentation, vol. 80 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 19 June 2017

Tracy Harwood and Tony Garry

The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems…

7380

Abstract

Purpose

The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems contexts may be inappropriate for use within an IoT context. The purpose of this paper is to offer empirically generated understandings of trust within potential IoT applications.

Design/methodology/approach

In an attempt to capture and communicate the complex and all-pervading but frequently inconspicuous nature of ubiquitous technologies within potential IoT techno-systems, propositions developed are investigated using a novel mixed methods research design combining a videographic projective technique with a quantitative survey, sampling 1,200 respondents.

Findings

Research findings suggest the dimensionality of trust may vary according to the IoT techno-service context being assessed.

Originality/value

The contribution of this paper is twofold. First, and from a theoretical perspective, it offers a conceptual foundation for trust dimensions within potential IoT applications based upon empirical evaluation. Second, and from a pragmatic perspective, the paper offers insights into how findings may guide practitioners in developing appropriate trust management systems dependent upon the characteristics of particular techno-service contexts.

Details

Journal of Service Management, vol. 28 no. 3
Type: Research Article
ISSN: 1757-5818

Keywords

1 – 5 of 5