Search results
1 – 10 of over 11000Alexander M. Robertson and Peter Willett
This paper provides an introduction to the use of n‐grams in textual information systems, where an n‐gram is a string of n, usually adjacent, characters extracted from a section…
Abstract
This paper provides an introduction to the use of n‐grams in textual information systems, where an n‐gram is a string of n, usually adjacent, characters extracted from a section of continuous text. Applications that can be implemented efficiently and effectively using sets of n‐grams include spelling error detection and correction, query expansion, information retrieval with serial, inverted and signature files, dictionary look‐up, text compression, and language identification.
Details
Keywords
This review reports on the current state and the potential of tools and systems designed to aid online searching, referred to here as online searching aids. Intermediary…
Abstract
This review reports on the current state and the potential of tools and systems designed to aid online searching, referred to here as online searching aids. Intermediary mechanisms are examined in terms of the two stage model, i.e. end‐user, intermediary, ‘raw database’, and different forms of user — system interaction are discussed. The evolution of the terminology of online searching aids is presented with special emphasis on the expert/non‐expert division. Terms defined include gateways, front‐end systems, intermediary systems and post‐processing. The alternative configurations that such systems can have and the approaches to the design of the user interface are discussed. The review then analyses the functions of online searching aids, i.e. logon procedures, access to hosts, help features, search formulation, query reformulation, database selection, uploading, downloading and post‐processing. Costs are then briefly examined. The review concludes by looking at future trends following recent developments in computer science and elsewhere. Distributed expert based information systems (debis), the standard generalised mark‐up language (SGML), the client‐server model, object‐orientation and parallel processing are expected to influence, if they have not done so already, the design and implementation of future online searching aids.
Alisa Brink, C. Kevin Eller and Huiqi Gan
We conduct an experiment to examine the occurrence of the bystander effect on willingness to report a fraudulent act. Specifically, we investigate the impact of evidence strength…
Abstract
We conduct an experiment to examine the occurrence of the bystander effect on willingness to report a fraudulent act. Specifically, we investigate the impact of evidence strength on managers’ decisions to blow the whistle in the presence and absence of other employees who have knowledge of the wrongdoing. Results indicate that when there is strong evidence indicating a fraudulent act, individuals with sole knowledge are more likely to report than when others are aware of the fraudulent act (the bystander effect). However, the bystander effect is not found when evidence of fraud is weak. Further, a mediated moderation analysis indicates that perceived personal responsibility to report mediates the relation between others’ awareness of the questionable act and reporting likelihood, suggesting that the bystander effect is driven by diffusion of responsibility. Our results have implications for all types of organizations that wish to mitigate the detrimental effect of fraud. Specifically, training or incentives may be necessary to overcome the bystander effect in an organization.
Details
Keywords
A behavioural approach to information retrieval system design is outlined based on the derivation of a behavioural model of the information seeking patterns of academic social…
Abstract
A behavioural approach to information retrieval system design is outlined based on the derivation of a behavioural model of the information seeking patterns of academic social scientists. The information seeking patterns of a variety of academic social scientists were broken down into six characteristics: starting, chaining, browsing, differentiating, monitoring, and extracting. These characteristics constitute the principal generic features of the different individual patterns, and together provide a flexible behavioural model for information retrieval system design. The extent to which these characteristics are available on existing systems is considered, and the requirements for implementing the features on an experimental system are set out.
Sobeida Margarita Giraldo, Luis Joyanes Aguilar, Lillyana María Giraldo and Iván Darío Toro
This paper aims to explore the requirements of organizational knowledge management initiatives using requirements engineering techniques, identifying the optimal techniques…
Abstract
Purpose
This paper aims to explore the requirements of organizational knowledge management initiatives using requirements engineering techniques, identifying the optimal techniques configuration and serving as a management tool for knowledge engineers.
Design/methodology/approach
The method is selection attributes. Knowledge management enablers are characterized and mapped with the coverage capabilities of requirements engineering techniques, using the attributes of the elicited object and a box-plot analysis. The information is gathered from 280 references, 32 companies and 16 experts in requirements engineering.
Findings
Requirements of organizational knowledge management initiatives are got optimally by combining interviews, use cases, scenarios, laddering and focus group techniques. The requirements of structure and processes are more complex to identify, while culture requirements are the best covered.
Research limitations/implications
Knowledge management enablers are analyzed according to the current studies and comprehension of engineering techniques.
Practical implications
Knowledge engineers need to consider the coverage capabilities of engineering techniques to design an optimal requirement identification and meet the objectives of organizational knowledge acquisition initiatives. Requirement engineers can improve the requirements identification by a staged selection process.
Social implications
The requirements of knowledge management initiatives that impact the community can be identified and traced to ensure the knowledge objectives. Requirements related to culture and people, like shared values, beliefs, and behaviors, are also considered.
Originality/value
To the best of the authors’ knowledge, this is the first study about formal requirement identification of knowledge management initiatives in the organizational context, providing the optimal configuration. A novel staged process is proposed for requirements engineering techniques selection, analyzing the enablers at component level and identifying the attributes associated with the elicited object.
Details
Keywords
This paper analyses the theoretical and the epistemological assumptions of information science (IS). Different views of knowledge underlie all major issues in IS. Epistemological…
Abstract
This paper analyses the theoretical and the epistemological assumptions of information science (IS). Different views of knowledge underlie all major issues in IS. Epistemological theories have a fundamental impact on theories about users, their cognition and information seeking behaviour, on subject analysis, and on classification. They have also fundamental impact on information retrieval, on the understanding of “information”, on the view of documents and their role in communication, on information selection, on theories about the functions of information systems and on the role of information professionals. IS must be based on epistemological knowledge, which avoids blind alleys and is not outdated. The paper shows limitations in the dominant approaches to IS and proposes alternative viewpoints.
Details
Keywords
Purpose – Having concluded that the long-term and ongoing murders and disappearances of Indigenous women, girls, and 2SLGBTQQIA (MMIWG2S+) people is genocide, the National Inquiry…
Abstract
Purpose – Having concluded that the long-term and ongoing murders and disappearances of Indigenous women, girls, and 2SLGBTQQIA (MMIWG2S+) people is genocide, the National Inquiry into Missing and Murdered Indigenous Women and Girls (NIMMIWG) (2019) made 231 Calls for Justice in relation to culture, health, security, and criminal justice to broadly address the ongoing colonial dispossession and systemic, racialized, and gendered violence against MMIWG2S+ people. In response to these Calls for Justice, this article traces Indigenous grassroots initiatives to show the many ways that justice can be broadly conceived and mobilized to address the murders and disappearances.
Methodology/Approach – Drawing on the Unearthing Justices Resource Collection of 500+ Indigenous grassroots initiatives for the MMIWG2S+ people, this work theorizes a spatial approach to justice using mapping methodologies.
Findings – Not only have Indigenous families and communities been calling for justice, but they have also been cultivating justice across the land by building constellations of resource and support. The author traces the land-based activities specific to community patrols, land-based commemorations, search support, and walks and journeys to show the vast resources, skills, and strengths that already exist in Indigenous communities and how justice can be conceptualized within its local and spatial arrangements, and beyond the imaginaries of a criminal justice system.
Originality/Value – Where the ongoing colonial dispossession and systemic, racialized, and gendered violence against MMIWG2S+ people is well documented, there has been less consideration of how Indigenous families and communities have navigated a terrain where justice continues to be absent,elusive, or invasive.
Details
Keywords
We review and summarize accounting literature that examines whistleblowing in the accounting context. We organize our review around the five determinants of whistleblowing…
Abstract
We review and summarize accounting literature that examines whistleblowing in the accounting context. We organize our review around the five determinants of whistleblowing identified by Near and Miceli (1995). The first determinant is characteristics of the whistleblower. Studies related to this determinant examine whistleblowers’ personality characteristics, moral judgment, and demographic characteristics. Studies related to the second determinant, characteristics of the report recipient, examine characteristics of the individual or individuals who receive the report and characteristics of the reporting channel. The third determinant is characteristics of the wrongdoer. Studies in this area focus on the wrongdoer’s power and credibility. Fourth, accounting studies related to characteristics of the wrongdoing examine factors that affect the dependence of the organization on the wrongdoing and evidence credibility. Studies related to the final determinant, characteristics of the organization, examine organizational perceptions of the appropriateness of whistleblowing, organizational climate, and organizational structure. For each determinant, we first summarize and analyze the findings of prior research, and then we present suggestions for future accounting research in whistleblowing.
Details
Keywords
Normalised standard scores. Before leaving the question of standardising scores it should be mentioned that there is a simpler method of deriving standard scores that is more…
Abstract
Normalised standard scores. Before leaving the question of standardising scores it should be mentioned that there is a simpler method of deriving standard scores that is more convenient for the everyday class test. This method consists of finding the normalised standard score.
Ben Carterette, Evangelos Kanoulas and Emine Yilmaz
Purpose — The overall quality of an information retrieval system depends on many different aspects of the system and its users' information seeking behaviour, such as the speed of…
Abstract
Purpose — The overall quality of an information retrieval system depends on many different aspects of the system and its users' information seeking behaviour, such as the speed of the system, the user interface, the query language and the features provided by the engine. One of the most important aspects is the effectiveness of the retrieval system, i.e. its ability to retrieve items that are relevant to the information need of an end user. This chapter focuses on methods for measuring effectiveness, in particular focusing on recent work that more directly models the utility of an engine to its users.
Methodology/approach — We discuss traditional approaches to effectiveness evaluation based on test collections, then transition to approaches based on test collections along with explicit models of user interaction with search results. We contrast this with approaches for which the user is ‘in the loop’, such as user studies and online evaluations.
Research limitations/implications — If it were possible to model users perfectly, we could directly estimate the utility of a search engine to its users; this would undoubtedly have a transformative effect on information retrieval and web search research. In practice, this goal will never be achievable because users exhibit far too much variability in how they approach the search engine, and furthermore provide valuable feedback that models and simulations cannot provide. Nevertheless, better models of user interaction will help develop better web search engines for a wider variety of tasks more rapidly.
Originality/value of paper — This is the first work that surveys recent work on user model-based evaluation and places it in a context with traditional evaluation based on the Cranfield paradigm.
Details