14,718 research outputs found

    Lines-of-inquiry and sources of evidence in work-based research

    Get PDF
    There is synergy between the investigative practices of police detectives and social scientists, including work-based researchers. They both develop lines-of-inquiry and draw on multiple sources of evidence in order to make inferences about people, trends and phenomena. However, the principles associated with lines-of-inquiry and sources of evidence have not so far been examined in relation to work-based research methods, which are often unexplored or ill-defined in the published literature. We explore this gap by examining the various direct and indirect lines-of-inquiry and the main sources of primary and secondary evidence used in work-based research, which is especially relevant because some work-based researchers are also police detectives. Clearer understanding of these intersections will be useful in emerging professional contexts where the work-based researcher, the detective, and the social scientist cohere in the one person and their research project. The case we examined was a Professional Studies programme at a university in Australia, which has many police detectives doing work-based research, and from their experience we conclude there is synergy between work-based research and lines of enquiry. Specifically, in the context of research methods, we identify seven sources of evidence: 1) creative, unstructured, and semi-structured interviews; 2) structured interviews; 3) consensus group methods; 4) surveys; 5) documentation and archives; 6) direct observations and participant observations; and 7) physical or cultural artefacts, and show their methodological features related to data and method type, reliability, validity, and types of analysis, along with their respective advantages and disadvantages. This study thereby unpacks and isolates those characteristics of work-based research which are relevant to a growing body of literature related to the messy, co-produced and wicked problems of private companies, government agencies, and non-government organisations and the research methods used to investigate them

    Architectural implications for context adaptive smart spaces

    Get PDF
    Buildings and spaces are complex entities containing complex social structures and interactions. A smart space is a composite of the users that inhabit it, the IT infrastructure that supports it, and the sensors and appliances that service it. Rather than separating the IT from the buildings and from the appliances that inhabit them and treating them as separate systems, pervasive computing combines them and allows them to interact. We outline a reactive context architecture that supports this vision of integrated smart spaces and explore some implications for building large-scale pervasive systems

    Medium for empowerment or a 'centre for everything': students’ experience of control in digital environments within a university context

    Get PDF
    In maximising opportunities to nurture rich and productive learning communities, there is a need to know more about the cultures and sub-cultures that surround virtual learning environments (VLEs). Drawing from a small-scale interview study of students’ digital practices, this paper explores how different discourses may have patterned a group of students’ experiences of VLEs. Unlike studies which have focused upon evaluations of specific projects or interventions, this study investigated their experience across their course. It explores the student identities they associated with digital environments and the power relationships which seemed to pattern how they positioned themselves (or felt positioned) as learners. Whilst none were intimidated by technical aspects, the student identities available to them seemed to vary, as did their perceptions of the student identities associated with university-sponsored digital environments. The analysis considers three aspects of their experience: how they related to the VLE itself, how they related to others through this, and the alternative communities they created to attempt to manage their engagement with the VLE. The paper concludes by arguing for further research which focuses on the broader student experience across courses in order to explore how university-based digital environments intersect with students’ identities as learners

    Contextualising the Insider Threat: A Mixed Method Study

    Get PDF
    The insider threat is potentially the most damaging and costly threat to organisations, and while there is a considerable body of literature aimed at understanding this phenomenon, we contend that the theories contained in such literature are most beneficial if they can be utilised in a way that is contextually relevant. Our research, and this paper, is specifically focussed on developing and improving this contextual validity. We find that malicious acts arising from disgruntlement are perceived as very real problems in practice. We also present a current list of non-malicious aberrant behaviors and show how they rank in relative seriousness to one another. Given that the primary motivation for conducting this study is the view that reliance on the traditional conceptualization of a boundary or perimeter is no longer viable, our essential contribution lies in devising a series of vignettes that empirically reflect this current contextual validity
    • …
    corecore