Search results
1 – 10 of 44Di Wu, Lei Wu, Alexis Palmer, Dr Kinshuk and Peng Zhou
Interaction content is created during online learning interaction for the exchanged information to convey experience and share knowledge. Prior studies have mainly focused on the…
Abstract
Purpose
Interaction content is created during online learning interaction for the exchanged information to convey experience and share knowledge. Prior studies have mainly focused on the quantity of online learning interaction content (OLIC) from the perspective of types or frequency, resulting in a limited analysis of the quality of OLIC. Domain concepts as the highest form of interaction are shown as entities or things that are particularly relevant to the educational domain of an online course. The purpose of this paper is to explore a new method to evaluate the quality of OLIC using domain concepts.
Design/methodology/approach
This paper proposes a novel approach to automatically evaluate the quality of OLIC regarding relevance, completeness and usefulness. A sample of OLIC corpus is classified and evaluated based on domain concepts and textual features.
Findings
Experimental results show that random forest classifiers not only outperform logistic regression and support vector machines but also their performance is improved by considering the quality dimensions of relevance and completeness. In addition, domain concepts contribute to improving the performance of evaluating OLIC.
Research limitations/implications
This paper adopts a limited sample to train the classification models. It has great benefits in monitoring students’ knowledge performance, supporting teachers’ decision-making and even enhancing the efficiency of school management.
Originality/value
This study extends the research of domain concepts in quality evaluation, especially in the online learning domain. It also has great potential for other domains.
Details
Keywords
Praveen Ranjan Srivastava, Kinshuk Sengupta, Ajay Kumar, Baidyanath Biswas and Alessio Ishizaka
The new coronavirus is a highly infectious disease with mutating variants leading to pervasive risk around geographies and public health system. The economy has been suffering due…
Abstract
Purpose
The new coronavirus is a highly infectious disease with mutating variants leading to pervasive risk around geographies and public health system. The economy has been suffering due to the strategic lockdown adopted by the local administrative bodies, and in most of the countries, it is further leading to a major wave of unemployment with millions of job and business losses affecting the hotels, travel and tourism industry widely. To attain a sustainable business in the post-pandemic situations, the industry now must think of information system approaches to convince tourists to feel safe with the most hygienic hospitality and services to be offered in any property. The key aspect of the study is to provide the impact of new-age AI-driven technology solutions that will dominate the future direction of the modernized hospitality industry promising robust health-safety measures in a hotel, and further help create sustainable business and leisure travel facilities to cope with post-epidemic scenarios.
Design/methodology/approach
The study emphasizes to provide a robust technology-oriented framework based on a mixed research method that would help hotels to adopt and implement new-age AI-driven solution within the hotel premise to serve customers with at most hygiene, contactless service and thereafter, aiming for faster recovery of businesses and regaining customer trust to fuel booking intent in the post-epidemic scenario.
Findings
The paper provides a technology-focused solution that would impact hotel industries' post-pandemic scenario. The study contributes to helping boost the tourism industry using information management solutions such as biosensors, robotic room services and contactless hosting. The findings show the adoption of robots/RPA solutions and Biosensors by the industry will be a disruptive paradigm shift.
Originality/value
The study expands the scope of research in information technology and management with a focus on the hospitality industry while contributing to new factors impacting customer buying behavior in the industry.
Details
Keywords
Tim Finin, Li Ding, Lina Zhou and Anupam Joshi
Aims to investigate the way that the semantic web is being used to represent and process social network information.
Abstract
Purpose
Aims to investigate the way that the semantic web is being used to represent and process social network information.
Design/methodology/approach
The Swoogle semantic web search engine was used to construct several large data sets of Resource Description Framework (RDF) documents with social network information that were encoded using the “Friend of a Friend” (FOAF) ontology. The datasets were analyzed to discover how FOAF is being used and investigate the kinds of social networks found on the web.
Findings
The FOAF ontology is the most widely used domain ontology on the semantic web. People are using it in an open and extensible manner by defining new classes and properties to use with FOAF.
Research limitations/implications
RDF data was only obtained from public RDF documents published on the web. Some RDF FOAF data may be unavailable because it is behind firewalls, on intranets or stored in private databases. The ways in which the semantic web languages RDF and OWL are being used (and abused) are dynamic and still evolving. A similar study done two years from now may show very different results.
Originality/value
This paper describes how social networks are being encoded and used on the world wide web in the form of RDF documents and the FOAF ontology. It provides data on large social networks as well as insights on how the semantic web is being used in 2005.
Details
Keywords
Through observing the use of iPhone and iPad by a child between the ages of two and four years and a half, this study presents accounts on the child’s use of and interaction with…
Abstract
Purpose
Through observing the use of iPhone and iPad by a child between the ages of two and four years and a half, this study presents accounts on the child’s use of and interaction with these devices, as well as her interaction with the physical environment.
Design/methodology/approach
Unstructured, naturalistic observation was employed in this study. The study is grounded in theories of user engagement with digital and physical objects.
Findings
A child’s interaction with touch-based devices does not deter the child from engaging effectively with the physical environment or from activities centered on creativity and interpersonal engagement. A child is able to move back and forth seamlessly between the physical and digital environments.
Practical implications
Findings from this study could help parents, educators, and system designers understand why and how toddlers and preschoolers use and engage with touch-based devices, as well as the kind of tasks they perform.
Originality/value
Studies of toddlers’ or preschoolers’ information behavior and interaction with touch-based devices are scarce. Children born toward the end of the first decade of the twenty-first century are growing up with a propensity to using touch-based devices. This study provides a framework for effective usage of such devices while ensuring all-round cognitive and physical development of the child.
Details
Keywords
The aim of this study is to understand a family firm's choice of related-party transaction (RPT) types and analyze their value impacts to separate the abusive from benign RPTs.
Abstract
Purpose
The aim of this study is to understand a family firm's choice of related-party transaction (RPT) types and analyze their value impacts to separate the abusive from benign RPTs.
Design/methodology/approach
It uses a 10-year panel of BSE-listed 378 family (and 200 non-family) firms. The fixed effects, logit and difference-in-difference (DID) models help examine value effects, propensity and persistence of harmful RPTs.
Findings
Loans/guarantees (irrespective of counterparties) destroy firm value. Capital asset RPTs decrease the firm value but enhance value when undertaken with holding parties. Operating RPTs increase firm value and profitability. They improve asset utilization and reduce discretionary expenses (especially when made with controlled entities). Family firms have larger loans/guarantees and capital asset volumes but have smaller operating RPTs than non-family firms. They are less likely to undertake loans/guarantees (and even operating RPTs) and more capital RPTs vis-à-vis non-family firms. Family firms persist with dubious loans/guarantees but hold back beneficial operating RPTs, despite RPTs being in investor cross-hairs amid the Satyam scam.
Research limitations/implications
Rent extractability and counterparty incentives supplement each other. (1) The higher extractability of related-party loans and guarantees (RPLGs) dominates the lower extraction incentives of controlled parties. (2) Holding parties' bringing assets, providing a growth engine and adding value dominate their higher extraction incentives (3) The big gains to the operational efficiency come from operating RPTs with controlled parties, generally operating companies in the family house. (4) Dubious RPTs seem more integral to family firms' choices than non-family firms. (5) Counterparty incentives behind the divergent use of RPTs deserve more research attention. Future studies can give more attention to how family characteristics affect divergent motives behind RPTs.
Practical implications
First, the study does not single out family firms for dubious use of all RPTs. Second, investors, auditors or creditors must pay close attention to RPLGs as a special expropriation mechanism. Third, operating RPTs (and capital RPTs with holding parties) benefit family firms. However, solid procedural safeguards are necessary. Overall, results may help clarify the dilemma Indian regulators face in balancing the abusive and business sides of RPTs.
Originality/value
The study fills the gap by arguing why some RPTs may be dubious or benign and then shows how RPTs' misuse depends on counterparty types. It shows operating RPTs enhance operating efficiencies on several dimensions and that benefits may vary with counterparty types. It also presents the first evidence that family firms favor dubious RPTs more and efficient RPTs less than non-family firms.
Details