112,416 research outputs found

    Contextual Sensitivity in Grounded Theory: The Role of Pilot Studies

    Get PDF
    Grounded Theory is an established methodological approach for context specific inductive theory building. The grounded nature of the methodology refers to these specific contexts from which emergent propositions are drawn. Thus, any grounded theory study requires not only theoretical sensitivity, but also a good insight on how to design the research in the human activity systems to be studied. The lack of this insight may result in inefficient theoretical sampling or even erroneous purposeful sampling. These problems would not necessarily be critical, as it could be argued that through the elliptical process that characterizes grounded theory, remedial loops would always bring the researcher to the core of the theory. However, these elliptical remedial processes can take very long periods of time and result in catastrophic delays in research projects. As a strategy, this paper discusses, contrasts and compares the use of pilot studies in four different grounded theory projects. Each pilot brought different insights about the context, resulting in changes of focus, guidance to improve data collection instruments and informing theoretical sampling. Additionally, as all four projects were undertaken by researchers with little experience of inductive approaches in general and grounded theory in particular, the pilot studies also served the purpose of training in interviewing, relating to interviewees, memoing, constant comparison and coding. This last outcome of the pilot study was actually not planned initially, but revealed itself to be a crucial success factor in the running of the projects. The paper concludes with a theoretical proposition for the concept of contextual sensitivity and for the inclusion of the pilot study in grounded theory research designs

    Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery

    Get PDF
    Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them. This complex landscape has made it extremely difficult for security administrators to keep accurate and be effective in protecting their systems against cyber threats. In this paper, we describe our vision and scientific posture on how artificial intelligence techniques and a smart use of security knowledge may assist system administrators in better defending their networks. To that end, we put forward a research roadmap involving three complimentary axes, namely, (I) the use of FCA-based mechanisms for managing configuration vulnerabilities, (II) the exploitation of knowledge representation techniques for automated security reasoning, and (III) the design of a cyber threat intelligence mechanism as a CKDD process. Then, we describe a machine-assisted process for cyber threat analysis which provides a holistic perspective of how these three research axes are integrated together

    Fundamental concepts in management research and ensuring research quality : focusing on case study method

    Get PDF
    This paper discusses fundamental concepts in management research and ensuring research quality. It was presented at the European Academy of Management annual conference in 2008

    Finding Structured and Unstructured Features to Improve the Search Result of Complex Question

    Get PDF
    -Recently, search engine got challenge deal with such a natural language questions. Sometimes, these questions are complex questions. A complex question is a question that consists several clauses, several intentions or need long answer. In this work we proposed that finding structured features and unstructured features of questions and using structured data and unstructured data could improve the search result of complex questions. According to those, we will use two approaches, IR approach and structured retrieval, QA template. Our framework consists of three parts. Question analysis, Resource Discovery and Analysis The Relevant Answer. In Question Analysis we used a few assumptions, and tried to find structured and unstructured features of the questions. Structured feature refers to Structured data and unstructured feature refers to unstructured data. In the resource discovery we integrated structured data (relational database) and unstructured data (webpage) to take the advantaged of two kinds of data to improve and reach the relevant answer. We will find the best top fragments from context of the webpage In the Relevant Answer part, we made a score matching between the result from structured data and unstructured data, then finally used QA template to reformulate the question. In the experiment result, it shows that using structured feature and unstructured feature and using both structured and unstructured data, using approach IR and QA template could improve the search result of complex questions

    Collaborative tagging as a knowledge organisation and resource discovery tool

    Get PDF
    The purpose of the paper is to provide an overview of the collaborative tagging phenomenon and explore some of the reasons for its emergence. Design/methodology/approach - The paper reviews the related literature and discusses some of the problems associated with, and the potential of, collaborative tagging approaches for knowledge organisation and general resource discovery. A definition of controlled vocabularies is proposed and used to assess the efficacy of collaborative tagging. An exposition of the collaborative tagging model is provided and a review of the major contributions to the tagging literature is presented. Findings - There are numerous difficulties with collaborative tagging systems (e.g. low precision, lack of collocation, etc.) that originate from the absence of properties that characterise controlled vocabularies. However, such systems can not be dismissed. Librarians and information professionals have lessons to learn from the interactive and social aspects exemplified by collaborative tagging systems, as well as their success in engaging users with information management. The future co-existence of controlled vocabularies and collaborative tagging is predicted, with each appropriate for use within distinct information contexts: formal and informal. Research limitations/implications - Librarians and information professional researchers should be playing a leading role in research aimed at assessing the efficacy of collaborative tagging in relation to information storage, organisation, and retrieval, and to influence the future development of collaborative tagging systems. Practical implications - The paper indicates clear areas where digital libraries and repositories could innovate in order to better engage users with information. Originality/value - At time of writing there were no literature reviews summarising the main contributions to the collaborative tagging research or debate

    Requirements for Information Extraction for Knowledge Management

    Get PDF
    Knowledge Management (KM) systems inherently suffer from the knowledge acquisition bottleneck - the difficulty of modeling and formalizing knowledge relevant for specific domains. A potential solution to this problem is Information Extraction (IE) technology. However, IE was originally developed for database population and there is a mismatch between what is required to successfully perform KM and what current IE technology provides. In this paper we begin to address this issue by outlining requirements for IE based KM
    • …
    corecore