4,177 research outputs found
A Phenomenological Study of How Active Engagement in Black Greek Letter Sororities Influences Christian Members\u27 Spiritual Growth
This phenomenological study explored how being part of a Black Greek Letter. Organization (BGLO) sorority impacts the spiritual growth of its Christian members. One of the issues explored was the influence relationships within these sororities have on members striving to be like Christ. There is a dichotomy of perspectives regarding Black Greek Letter Organizations (BGLOs). They have a significant role in the Black community as organizations that foster leadership, philanthropy, and sisterhood and promote education. They are admired on and off college campuses and in the broader community in graduate chapters. The objective of phenomenology is to describe phenomena of spiritual growth among Christian sorority members from the life experiences of those who live them; that premise guided the interviews conducted for this study. The results found that active engagement in a BGLO sorority positively impacts its members\u27 spiritual growth. From the emotional stories of sisterhood, service, and devotion to prayer, their experiences evidenced strengthened walks of faith. This study contrasts the Anti-BGLO narrative as a testament to these organizations\u27 legacy and practices deeply grounded in the church
On the Mechanism of Building Core Competencies: a Study of Chinese Multinational Port Enterprises
This study aims to explore how Chinese multinational port enterprises (MNPEs) build
their core competencies. Core competencies are firmsâspecial capabilities and sources
to gain sustainable competitive advantage (SCA) in marketplace, and the concept led
to extensive research and debates. However, few studies include inquiries about the
mechanisms of building core competencies in the context of Chinese MNPEs.
Accordingly, answers were sought to three research questions:
1. What are the core competencies of the Chinese MNPEs?
2. What are the mechanisms that the Chinese MNPEs use to build their core
competencies?
3. What are the paths that the Chinese MNPEs pursue to build their resources bases?
The study adopted a multiple-case study design, focusing on building mechanism of
core competencies with RBV. It selected purposively five Chinese leading MNPEs
and three industry associations as Case Companies.
The study revealed three main findings. First, it identified three generic core
competencies possessed by Case Companies, i.e., innovation in business models and
operations, utilisation of technologies, and acquisition of strategic resources. Second,
it developed the conceptual framework of the Mechanism of Building Core
Competencies (MBCC), which is a process of change of collective learning in
effective and efficient utilization of resources of a firm in response to critical events.
Third, it proposed three paths to build core competencies, i.e., enhancing collective
learning, selecting sustainable processes, and building resource base.
The study contributes to the knowledge of core competencies and RBV in three ways:
(1) presenting three generic core competencies of the Chinese MNPEs, (2) proposing
a new conceptual framework to explain how Chinese MNPEs build their core
competencies, (3) suggesting a solid anchor point (MBCC) to explain the links among
resources, core competencies, and SCA. The findings set benchmarks for Chinese
logistics industry and provide guidelines to build core competencies
Recommended from our members
After Creation: Intergovernmental Organizations and Member State Governments as Co-Participants in an Authority Relationship
This is a re-amalgamation of what started as one manuscript and became two when the length proved to be more than any publisher wanted to consider. The splitting consisted of removing what are now Parts 3, 4, and 5 so that the manuscript focused on the outcome-related shared beliefs holding an authority relationship together. Those parts were last worked on in 2018. The rest were last worked on in late 2021 but also remain incomplete.
The relational approach adopted in this study treats intergovernmental organizations and the governments of member states as co-participants in an authority relationship with the governments of their member states. Authority relationships link two types of actor, defined by their authority-holder or addressee role in the relationship, through a set of shared beliefs about why the relationship exists and how the participants should fulfill their respective roles. The IGO as authority holder has a role that includes a right to instruct other actors about what they should or should not do; the governments of member states as addressees are expected to comply with the instructions. Three sets of shared beliefs provide the conceptual âglueâ holding the relationship together. The first defines the goal of the collective effort, providing both the rationale for having the authority relationship and providing a lode star for assessments of the collective effortâs success or lack of success. The second set defines the shared understanding about allocation of roles and the process of interaction by establishing shared expectations about a) the selection process by which particular actors acquire authority holder roles, b) the definitions identifying one or more categories of addressees expected to follow instructions, and c) the procedures through which the authority holder issues instructions. The third set focus on the outcomes of cooperation through the relationship by defining a) the substantive areas in which the authority holder may issue instructions, b) the bases for assessing the relevance actions mandated in instructions for reaching the goal, and c) the relative efficacy of action paths chosen for reaching the goal as compared to other possible action paths.
Using an authority relationship framework for analyzing cooperation through IGOs highlights the inherently bi-directional nature of IGO-member government activity by viewing their interaction as involving a three-step process in which the IGO as authority holder decides when to issue what instruction, the member state governments as followers react to the instruction with anything from prompt and full compliance through various forms of pushback to outright rejection, and the IGO as authority holder responds to how the followers react with efforts to increase individual compliance with instructions and reinforce continuing acceptance of the authority relationship. Foregrounding the dynamics produced by the interaction of these two streams of perception and action reveals more clearly how far intergovernmental organizations acquire capacity to operate as independent actors, the dynamic ways they maintain that capacity, and how much they influence member governmentsâ beliefs and actions at different times. The approach fosters better understanding of why, when, and for how long governments choose cooperation through an IGO even in periods of rising unilateralism
A Syntactical Reverse Engineering Approach to Fourth Generation Programming Languages Using Formal Methods
Fourth-generation programming languages (4GLs) feature rapid development with minimum configuration required by developers. However, 4GLs can suffer from limitations such as high maintenance cost and legacy software practices.
Reverse engineering an existing large legacy 4GL system into a currently maintainable programming language can be a cheaper and more effective solution than rewriting from scratch. Tools do not exist so far, for reverse engineering proprietary XML-like and model-driven 4GLs where the full language specification is not in the public domain.
This research has developed a novel method of reverse engineering some of the syntax of such 4GLs (with Uniface as an exemplar) derived from a particular system, with a view to providing a reliable method to translate/transpile that system's code and data structures into a modern object-oriented language (such as C\#).
The method was also applied, although only to a limited extent, to some other 4GLs, Informix and Apex, to show that it was in principle more broadly applicable. A novel testing method that the syntax had been successfully translated was provided using 'abstract syntax trees'.
The novel method took manually crafted grammar rules, together with Encapsulated Document Object Model based data from the source language and then used parsers to produce syntactically valid and equivalent code in the target/output language.
This proof of concept research has provided a methodology plus sample code to automate part of the process. The methodology comprised a set of manual or semi-automated steps. Further automation is left for future research.
In principle, the author's method could be extended to allow the reverse engineering recovery of the syntax of systems developed in other proprietary 4GLs. This would reduce time and cost for the ongoing maintenance of such systems by enabling their software engineers to work using modern object-oriented languages, methodologies, tools and techniques
The Digital Continent:Placing Africa in Planetary Networks of Work
Only ten years ago, there were more internet users in countries like France or Germany than in all of Africa put together. But much has changed in a decade. The year 2018 marks the first year in human history in which a majority of the worldâs population are now connected to the internet. This mass connectivity means that we have an internet that no longer connects only the worldâs wealthy. Workers from Lagos to Johannesburg to Nairobi and everywhere in between can now apply for and carry out jobs coming from clients who themselves can be located anywhere in the world. Digital outsourcing firms can now also set up operations in the most unlikely of places in order to tap into hitherto disconnected labour forces. With CEOs in the Global North proclaiming that âlocation is a thing of the pastâ (Upwork, 2018), and governments and civil society in Africa promising to create millions of jobs on the continent, the book asks what this ânew world of digital workâ means to the lives of African workers. It draws from a year-long fieldwork in South Africa, Kenya, Nigeria, Ghana, and Uganda, with over 200 interviews with participants including gig workers, call and contact centre workers, self-employed freelancers, small-business owners, government officials, labour union officials, and industry experts. Focusing on both platform-based remote work and call and contact centre work, the book examines the job quality implications of digital work for the lives and livelihoods of African workers
Great expectations: unsupervised inference of suspense, surprise and salience in storytelling
Stories interest us not because they are a sequence of mundane and predictable events but because they have drama and tension. Crucial to creating dramatic and exciting stories are surprise and suspense. Likewise, certain events are key to the plot and more important than others. Importance is referred to as salience. Inferring suspense, surprise and salience are highly challenging for computational systems. It is difficult because all these elements require a strong comprehension of the characters and their motivations, places, changes over time, and the cause/effect of complex interactions.
Recently advances in machine learning (often called deep learning) have substantially improved in many language-related tasks, including story comprehension and story writing. Most of these systems rely on supervision; that is, huge numbers of people need to tag large quantities of data to tell the system what to teach these systems. An example would be tagging which events are suspenseful. It is highly inflexible and costly.
Instead, the thesis trains a series of deep learning models via only reading stories, a self-supervised (or unsupervised) system. Narrative theory methods (rules and procedures) are applied to the knowledge built into the deep learning models to directly infer salience, surprise, and salience in stories. Extensions add memory and external knowledge from story plots and from Wikipedia to infer salience on novels such as Great Expectations and plays such as Macbeth. Other work adapts the models as a planning system for generating new stories.
The thesis finds that applying the narrative theory to deep learning models can align with the typical reader. In follow up work, the insights could help improve computer models for tasks such as automatic story writing, assistance for writing, summarising or editing stories. Moreover, the approach of applying narrative theory to the inherent qualities built in a system that learns itself (self-supervised) from reading from books, watching videos, listening to audio is much cheaper and more adaptable to other domains and tasks. Progress is swift in improving self-supervised systems. As such, the thesis's relevance is that applying domain expertise with these systems may be a more productive approach in many areas of interest for applying machine learning
Recommended from our members
Reducing the harm from alcohol by regulating cross-border alcohol marketing, advertising and promotion: a technical report
At its 146th session in 2020, the WHO Executive Board asked the Organization to develop an action plan for the period 2022â2030 to boost implementation of the Global strategy to reduce the harmful use of alcohol (referred to below as the âGlobal alcohol strategyâ) as a public health priority. To contribute to the development of the action plan, the Executive Boardâs Decision 146 (14) requested the WHO Director-General to develop âa technical report on the harmful use of alcohol related to cross-border alcohol marketing, advertising and promotional activities, including those targeting youth and adolescentsâ (WHO, 2020).
In order to produce the technical report requested by Decision EB146 (14), the WHO Secretariat commissioned a scoping review of cross-border marketing and a series of background papers to inform the process of developing the technical report; summaries of these commissioned papers are included as Annexes 1â4 to this report. The objective of the scoping review was to inform the development of the technical report by critically reviewing the key concepts underpinning the harmful use of alcohol in relation to cross-border alcohol marketing, summarizing the relevant research literature and research methodologies, and describing the main types and sources of information available. The Secretariat also convened several meetings with experts to discuss and elaborate on cross-border marketing of alcohol. A detailed outline of the report was also discussed at the third Forum on Alcohol, Drugs and Addictive Behaviours in June 2021, and elements of cross-border marketing were discussed with economic operators in dialogue meetings in 2020 and 2021
Contested Deployment
As indicated in the 2018 National Defense Strategy and evolving Multi-Domain Operations doctrine, the assumption the homeland will provide a secure space for mobilization and deployment is no longer valid. This integrated research project goes beyond affirming this assumption and contributes to efforts to mitigate the concerns a contested deployment entails.
Following the introductory chapter, Chapter 2, âArmy Deployments in a Contested Homeland: A Framework for Protection,â explores how current coordination and cooperation mechanisms between the DoD and state and local government may need realignment, with civil authorities preparing themselves to support military mobilization. Chapter 3, âStrategic Seaports and National Defense in a Contested Environment,â examines the 22 strategic seaports across the United States, identifying issues with throughput, structural integrity, security, readiness, funding, and authorities. Chapter 4, âSingle Point of Failure,â identifies how strict adherence to a business efficiency model for munition production and distribution may jeopardize the successful employment of military forces. Chapter 5, âThe Interstate Highway System: Reinvestment Needed before a Contested Deployment,â provides the status of the deteriorating road network and explains how associated vulnerabilities could be exploited by an adversary. The two appendices provide points for consideration on cyberattacks and defense and the impacts a full mobilization of reserve forces would have on the homeland.https://press.armywarcollege.edu/monographs/1944/thumbnail.jp
Perthâs Wartime Catalinas, 1942â1945: How the United States Navy and Qantas Catalina Flying Boats Protected Western Australia, Broke the Japanese Air Blockade, and Created a Post-War Legacy
This thesis analyses and assesses the wartime roles of Qantasâ Indian Ocean Service and the United States Navyâs Patrol Wing 10 from1942 to 1945. Throughout this period both operators faced extraordinary challenges in establishing and completing their missions. Flying from the Pelican Point area on the Swan River both Qantas and the US Navy contributed greatly to Australiaâs wartime defence, protecting Perth and Western Australia until warâs end in 1945
- âŠ