6 research outputs found

    How many keywords do authors assign to research articles – a multi-disciplinary analysis?

    Get PDF
    Author keywords are one important data source for co-word analysis. The distri-bution of author keywords in papers has not been investigated at the discipline level. We analyzed six research fields from soft science to hard science to reveal the underlying quantitative patterns of author keywords. Normal distribution, Poisson distribution, and Weibull distribution were fitted by applying Maximum Likelihood Estimation. Chi-Square tests and Kolmogorov-Smirnov tests were used to evaluate the goodness of fit. The results show that a large portion of pa-pers have no keyword or only one keyword in all these fields. The author key-word distributions of the six fields are represented. It’s shown that Weibull dis-tribution is the best fitted. This study provides practical implications for keyword selection in co-word analysis

    Can information ethics be conceptualized by using the core/periphery model?

    No full text
    The term ‘information ethics’ (IE) is rapidly diversifying as new technologies enter the milieu and add to already existing ‘entanglements’. Unsurprisingly, the term lacks a universally accepted definition, although there is some common ground as to its constitution.This paper explores the term using the most commonly co-occurring terms in IE literature as indexed in nine databases, namely the EBSCO-hosted Academic Search Premier(ASP); Communication and Mass Media Complete; ERIC; Library, Information Science and Technology Abstracts(LISTA); Newspaper Complete; Business Premier; and Master File Premier, and Wilson’s Library Literature and Information Science(LLIS)FullText. Core/periphery analysis, the co-occurrence of words as subject terms, and social network techniques were applied using UCINET for Windows, text STAT and Bibexcel computer-aided software to analyze data. The paper identifies the most common terms used to describe IE and the core terms with which IE can be defined. Other than informing LIS research and education, the results could potentially assist with the development of IE taxonomy and definitions(e.g. in understanding IE content and development) that may apply to the intercultural and global understanding of IE

    Can information ethics be conceptualized by using the core/periphery model?

    No full text
    The term ‘information ethics’ (IE) is rapidly diversifying as new technologies enter the milieu and add to already existing ‘entanglements’. Unsurprisingly, the term lacks a universally accepted definition, although there is some common ground as to its constitution.This paper explores the term using the most commonly co-occurring terms in IE literature as indexed in nine databases, namely the EBSCO-hosted Academic Search Premier(ASP); Communication and Mass Media Complete; ERIC; Library, Information Science and Technology Abstracts(LISTA); Newspaper Complete; Business Premier; and Master File Premier, and Wilson’s Library Literature and Information Science(LLIS)FullText. Core/periphery analysis, the co-occurrence of words as subject terms, and social network techniques were applied using UCINET for Windows, text STAT and Bibexcel computer-aided software to analyze data. The paper identifies the most common terms used to describe IE and the core terms with which IE can be defined. Other than informing LIS research and education, the results could potentially assist with the development of IE taxonomy and definitions(e.g. in understanding IE content and development) that may apply to the intercultural and global understanding of IE

    Service design : on the evolution of design expertise

    Get PDF

    Perspectiva social del fenómeno de la inclusión digital: Una aproximación desde la Complejidad

    Get PDF
    La inclusión digital es un fenómeno cuyo objetivo es reducir la brecha digital existente en una región determinada; brecha entendida como la diferencia en el acceso, uso, adopción y apropiación de las herramientas tecnológicas. Se encuentra a partir de la revisión del estado del arte que; por un lado, los proyectos-programas que intentan promover este fenómeno, se gestionan de manera reducida; y por el otro, que es relevante definir y aproximarse a dicho fenómeno desde la complejidad, para una posterior representación desde las ciencias de la complejidad. En el presente documento se muestra el desarrollo de la tesis doctoral cuyo objetivo es conformar una propuesta desde el pensamiento complejo y las ciencias de la complejidad que permita relevar la perspectiva social en el fenómeno complejo de la Inclusión digital. Se resalta en este punto, como a pesar de realizar en la literatura menciones acerca de la necesidad de un abordaje más social a los procesos de inclusión digital, estos son tratados sólo de forma superficial, dejándolos de forma implícita a los aspectos cuantitativos de carácter demográfico que se usan tanto para formular como para evaluar los diferentes programas-proyectos para inclusión digital. Como conclusión general e inicial se menciona que en el ambiente académico y para la gestión de programas-proyectos, existe interés de abordar el fenómeno de la inclusión digital desde la complejidad y sus principios. Y que este fenómenos puede explicarse desde este enfoqu para analizar el comportamiento de los procesos de adopción y apropiación de TICAbstract: Digital inclusion is a phenomenon whose objective is to reduce the existing digital divide in a given region; gap understood as the difference in access, use, adoption and appropriation of technological tools. It is found from the review of the state of the art that; On the one hand, the projects-programs that try to promote this phenomenon, are managed in a reduced way; and on the other, that it is relevant to define and approach this phenomenon from complexity, for a later representation from the complexity sciences. The present document shows the development of the doctoral thesis whose objective is to conform a proposal from the complex thought and the complexity sciences that allows to relieve the social perspective in the complex phenomenon of the digital Inclusion. It is highlighted in this point, as despite making references in the literature about the need for a more social approach to digital inclusion processes, these are treated only superficially, leaving them implicitly to the quantitative aspects of a demographic nature which are used both to formulate and to evaluate the different program-projects for digital inclusion. As a general and initial conclusion, it is mentioned that in the academic environment and for the management of program-projects, there is interest in addressing the phenomenon of digital inclusion from complexity and its principles. And that this phenomenon can be explained from this approach to analyze the behavior of the processes of adoption and appropriation of ICTDoctorad

    Adoption of competitive intelligence ethics in the ICT industry of South Africa

    Get PDF
    There are ethical concerns on how competitive intelligence (CI) is practiced. CI is mainly confused with industrial espionage or sometimes smeared with harmful unethical conduct. The assumptions have negative implications for the full recognition of CI as a profession and the reputation of the practice on, industries or firms and performance. In an attempt to address these concerns, the Strategic and Competitive Intelligence Professionals (SCIP) developed a CI code of ethics. However, critics of CI claim that the CI code of ethics has not been adopted by CI professionals, firms and industries. Moreover, there is very little evidence, if any, on how ethical theory influence the adoption of CI. In response to the critics, this study aimed at developing a CI Ethics Adoption Model (CIEAM) that will be the premise for analysing factors that positively or negatively influence the adoption of a CI code of ethics. This study followed interpretive structural modelling to identify core determinants of CI ethics adoption. Based on extracts from literature, a web-based questionnaire was designed, validated by CI experts and empirically/quantitatively tested by 184 South African ICT firms. The results reveal that South African ICT firms have adopted CI ethics to an absolute extent and utilises different CI ethics enforcement methods. The results also reveal that organisational and stakeholders’ factors, business ethics and ethical theories, decision-making factors, CI practice factors, raising CI ethics awareness, and CI ethics challenges are the core determinants for the adoption of CI ethics and are components of the CIEAM. In practice, the CIEAM may minimise unethical conduct by some CI professionals, and the confusion of CI with espionage, whilst improving the credibility and recognition of the CI profession. The model may also serve as a valuable tool for practitioners and scholars who need to measure the adoption of CI ethics across different business sectors. Theoretically, it may serve as input to the development of CI policies and CI ISO standards in the ICT industry and related industries. Recommendations are made towards the application of the model in other industries.Business ManagementD. Com. (Business Management
    corecore