T. Derek Halling and Douglas C. Hahn
The purpose of this paper is to transform a user‐authentication process for a document delivery and borrowing service into a simplified and unified logon access method consistent…
Abstract
Purpose
The purpose of this paper is to transform a user‐authentication process for a document delivery and borrowing service into a simplified and unified logon access method consistent with other library services by leveraging a University Lightweight Directory Access Protocol (LDAP).
Design/methodology/approach
Data fields were analyzed from the Texas A&M University Libraries' interlibrary loan and document delivery application (ILLiad) to determine the unique information that was critical to maintain account security and historical usage. As an added feature, plans were made and implemented to provide account authentication with another system entity through the use of Shibboleth software.
Findings
The campus LDAP proved a popular added feature. Since the implementation of the new authentication and authorization methods, usage of the service has increased even though the number of actual live accounts has decreased. Account security and user affiliation statistics were greatly improved.
Practical implications
More efficient authentication and authorization processes increased the effectiveness of the document delivery service. Use of the LDAP protocol and Shibboleth software enhanced the authentication process for both the library and the user. Eliminating the need for a separate set of credentials for use of the document delivery service reduced the potential for password fatigue.
Originality/value
The creation and implementation of different technologies to further refine migration and systematic processes. A guide to the steps taken to facilitate moving from one authentication method to a more advanced system leveraging Shibboleth and .ASP for quality assurance.
Details
Keywords
When groups meet, people form assumptions about the roles of variousparticipants within that group. Examines what these assumptions areusing three different approaches…
Abstract
When groups meet, people form assumptions about the roles of various participants within that group. Examines what these assumptions are using three different approaches: restructured non‐directed interaction; exploration of reasons for being there; self‐introduction of group and discussion of group roles. Discusses the role of facilitator in a group, and defines facilitation as opposed to leadership, finding facilitation is about empowering people to take control and responsibility for their own efforts. Illustrates how to become a good facilitator using fictional characters from a facilitation skills workshop. Ends by revealing how an individual′s potential can be released.
Details
Keywords
Tamari Kitossa and Gökbörü Sarp Tanyildiz
Purpose: To critically explore the implications of the August 2020, decision by Carleton University’s Institute for Criminology and Criminal Justice (ICCJ) to end to its intern…
Abstract
Purpose: To critically explore the implications of the August 2020, decision by Carleton University’s Institute for Criminology and Criminal Justice (ICCJ) to end to its intern program with the Ottawa police, the RCMP, Correctional Services Canada and Ottawa-Carleton Detention Centre starting in Fall 2021.
Findings: In contrast to the negative reaction of Kevin Haggerty to this decision, the authors offer a strong but qualified endorsement of the ICCJ’s move to put an end to its internship with coercive institutions. The ICCJ strategically mobilized discourses of anti-Blackness and inclusion in response to the murder of George Floyd and the individual and communitarian traumas of Black, First Nations and Metis and students colour in its program. The ICCJ did not, however, substantively engage with the ways that criminology, sociology and the university are complicit through the legitimation practices and processes of ideology, professionalization and research in the ‘violence work’ of the state. The critique, ethics and logical conclusion of abolitionism are obfuscated.
Methodology/Approach: The authors explicitly draw on the Black Radical Tradition, Neo-Marxism and radical neo-Weberianism to sketch research possibilities that resist the university as a space of violence work, both in criminology and in the professionalization of policing.
Originality/Value: The debate between the ICCJ and Kevin Haggerty is an important opportunity to critically analyze the limits of critical criminology and lacunae of a debate about abolitionism, anti-criminology and university-state nexus as a site for the production of ideological and hardware violence work. Grounded in the Black Radical Tradition, neo-Marxism and radical neo-Weberianism, the authors sketch a framework for a research agenda toward the abolition of criminology.
Details
Keywords
Matthew Gougherty and Tim Hallett
The sociology of education has various traditions which examine the connections between education, culture, and inequality. Two of these traditions, symbolic interactionism and…
Abstract
The sociology of education has various traditions which examine the connections between education, culture, and inequality. Two of these traditions, symbolic interactionism and critical theory, tend to ignore each other. This paper creates a dialogue between these traditions by applying symbolic interactionist (SI) and radical interactionist (RSI) sensibilities to an important study for resistance theory, Paul Willis’ classic ethnography Learning to Labor (1977). The SI reading of Learning to Labor emphasizes the importance of group interactions and the creation of meaning, while the RSI reading highlights how domination unfolds in social interaction. We argue that SI and RSI have much to offer Learning to Labor, as these readings can avoid some of the critiques commonly leveled on the book regarding the linkage between theory and data, structure and agency, and the book’s conceptualization of culture. Likewise, we argue that the data in Learning to Labor have much to offer SI and RSI, as the material provides grist to further understand the role of symbols in domination while identifying escalating dominance encounters that create a set of patterned interactions that we describe as a “grinding” social order.
Details
Keywords
Although there is great potential for diversity, library and information science (LIS) is a relatively homogenous profession. Increasing the presence of librarians of color may…
Abstract
Although there is great potential for diversity, library and information science (LIS) is a relatively homogenous profession. Increasing the presence of librarians of color may help to improve diversity within LIS. However, recruiting ethnic minorities into LIS has proven to be difficult despite various initiative including scholarships, fellowships, and locally focused programs. The central questions explored in this research can be divided into two parts: (1) Why do ethnic minorities choose librarianship as a profession? (2) What would motivate members of minority groups to join a profession in which they cannot see themselves?
The research was conducted through semi-structured, qualitative interviews of 32 ethnic minority students from one of four ethnic minority groups (African American, Asian American, Hispanic/Latino, and Native American) currently enrolled in an LIS graduate program. Eleven themes emerged from the data: libraries, librarians, library work experience, LIS graduate program, career plans and goals, education and family, support, mentors, ethnicity and community, acculturation, and views of diversity.
The findings seem to support many assumptions regarding expectations and career goals. The findings related to libraries, librarians, mentors, and support illustrate that many recruitment initiatives are starting in the right place. However, the most noteworthy findings were those that centered on identity, acculturation, and diversity because they dealt with issues that are not often considered or discussed by many in the profession outside of ethnic minority organizations.
The librarian and researcher have to be able to uncover specific articles in their areas of interest. This Bibliography is designed to help. Volume IV, like Volume III, contains…
Abstract
The librarian and researcher have to be able to uncover specific articles in their areas of interest. This Bibliography is designed to help. Volume IV, like Volume III, contains features to help the reader to retrieve relevant literature from MCB University Press' considerable output. Each entry within has been indexed according to author(s) and the Fifth Edition of the SCIMP/SCAMP Thesaurus. The latter thus provides a full subject index to facilitate rapid retrieval. Each article or book is assigned its own unique number and this is used in both the subject and author index. This Volume indexes 29 journals indicating the depth, coverage and expansion of MCB's portfolio.
Details
Keywords
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…
Abstract
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.
Details
Keywords
Alexandra L. Ferrentino, Meghan L. Maliga, Richard A. Bernardi and Susan M. Bosco
This research provides accounting-ethics authors and administrators with a benchmark for accounting-ethics research. While Bernardi and Bean (2010) considered publications in…
Abstract
This research provides accounting-ethics authors and administrators with a benchmark for accounting-ethics research. While Bernardi and Bean (2010) considered publications in business-ethics and accounting’s top-40 journals this study considers research in eight accounting-ethics and public-interest journals, as well as, 34 business-ethics journals. We analyzed the contents of our 42 journals for the 25-year period between 1991 through 2015. This research documents the continued growth (Bernardi & Bean, 2007) of accounting-ethics research in both accounting-ethics and business-ethics journals. We provide data on the top-10 ethics authors in each doctoral year group, the top-50 ethics authors over the most recent 10, 20, and 25 years, and a distribution among ethics scholars for these periods. For the 25-year timeframe, our data indicate that only 665 (274) of the 5,125 accounting PhDs/DBAs (13.0% and 5.4% respectively) in Canada and the United States had authored or co-authored one (more than one) ethics article.
Details
Keywords
The most obvious symptom of the most obvious trend in the building of new libraries is the fact that, as yet, no spade has entered the ground of the site on Euston Road, London…
Abstract
The most obvious symptom of the most obvious trend in the building of new libraries is the fact that, as yet, no spade has entered the ground of the site on Euston Road, London, upon which the new building for the British Library Reference Division has to be erected. Some twenty years of continued negotiation and discussion finally resulted in the choice of this site. The UK and much more of the world awaits with anticipation what could and should be the major building library of the twentieth century. The planning and design of a library building, however large or small, is, relatively speaking, a major operation, and deserves time, care and patience if the best results are to be produced.
Derek H.T. Walker, Paulo Vaz Serra and Peter E.D. Love
Price reliability for complex and highly complicated infrastructure projects is problematic. Traditional project delivery approaches generally fail in achieving targeted end cost…
Abstract
Purpose
Price reliability for complex and highly complicated infrastructure projects is problematic. Traditional project delivery approaches generally fail in achieving targeted end cost reliability. However, integrated project delivery (and particularly Alliancing), develop a far more reliable and robust project delivery plan and outturn time-cost targets. This paper aims to explore why this may be the case.
Design/methodology/approach
This case study investigated the project design, planning, cost/time estimation approach and how risk/uncertainty was dealt with. Five senior project delivery experts from an organisation that delivers multi-billion-dollar infrastructure projects in Australia were interviewed. These five experts collectively had 100+ cross-disciplinary experience years delivering complex infrastructure projects.
Findings
Alliancing adopts a radically different approach to project design, time/cost planning and risk assessment and management to traditional project delivery approaches. Key findings explain how the project alliance agreement designs-in processes that maximises team integration and collaboration. Analysis concludes that design thinking is used to craft and shape collaborative behaviours and project governance. Additionally, including project owner and facilities operator representatives in the project team adds valuable insights, expertise and knowledge contributing to planning reliability.
Research limitations/implications
This study is exploratory and focussed on complex infrastructure projects so findings cannot be generalised.
Practical implications
We unpack Alliancing processes that develop the target outturn cost plan, comprising a holistic and realistic plan to design a project to meet expected project outcomes. This case study may serve as an exemplar for complex project delivery.
Social implications
This paper illustrates how Alliancing more effectively delivers best value than traditional procurement approaches through its TOC-TAE processes.
Originality/value
The paper contributes to the scant existing academic literature analysing these processes. Its novel contribution is explaining how Alliancing treats unexpected events that in traditional delivery forms trigger expensive and time-energy-wasting disputation. This case study may serve as an exemplar for complex project delivery.