22,216 research outputs found
The Secondary-Rights Approach to the ‘Common Intention Constructive Trust’
Unlike ‘primary rights’ constructive trust doctrines, the CICT affords courts a wide discretion in determining the appropriate remedy in a particular case. This paper suggests that the CICT can take a step towards conceptual and analytical coherence if approached as a device for courts to award remedies that give effect to A’s secondary rights. When B breaches his primary duty to ensure A does not suffer harm from the unreliability of his induced assumptions, and when this causes A to suffer detrimental reliance, A obtains an unliquidated secondary right to be compensated for any harm, and a judge has discretion to determine the appropriate content of the remedy to compensate A for harm suffered. Since this approach is highly similar to proprietary estoppel, assimilating the CICT within proprietary estoppel can further benefit our understanding and practice of resolving disputes in the family homes context
Profiling research published in the journal of enterprise information management (JEIM)
Purpose – The purpose of this paper is to analyse research published in the Journal of Enterprise Information Management (JEIM) in the last ten years (1999 to 2008).
Design/methodology/approach – Employing a profiling approach, the analysis of the 381 JEIM publications includes examining variables such as the most active authors, geographic diversity, authors' backgrounds, co-author analysis, research methods and keyword analysis.
Findings – All the finding are in relation to the period of analysis (1999 to 2008). (a) Research categorised under descriptive, theoretical and conceptual methods is the most dominant research approach followed by JEIM authors. This is followed by case study research. (b) The largest proportion of contributions came from researchers and practitioners with an information systems background, followed by those with a background in business and computer science and IT. (c) The keyword analysis suggests that ‘information systems’, ‘electronic commerce’, ‘internet’, ‘logistics’, ‘supply chain management’, ‘decision making’, ‘small to medium-sized enterprises’, ‘information management’, ‘outsourcing’, and ‘modelling’ were the most frequently investigated keywords. (d) The paper presents and discusses the findings obtained from the citation analysis that determines the impact of the research published in the JEIM.
Originality/value – The primary value of this paper lies in extending the understanding of the evolution and patterns of IS research. This has been achieved by analysing and synthesising existing JEIM publications
Talk your way round: a speech interface to a virtual museum
Purpose: To explore the development of a speech interface to a Virtual World and to consider its relevance for disabled users. Method: The system was developed using mainly software that is available at minimal cost. How well the system functioned was assessed by measuring the number of times a group of users with a range of voices had to repeat commands in order for them to be successfully recognised. During an initial session, these users were asked to use the system with no instruction to see how easy this was. Results: Most of the spoken commands had to be repeated less than twice on average for successful recognition. For a set of ‘teleportation’ commands this figure was higher (2.4), but it was clear why this was so and could easily be rectified. The system was easy to use without instruction. Comments on the system were generally positive. Conclusions: While the system has some limitations, a Virtual World with a reasonably reliable speech interface has been developed almost entirely from software which is available at minimal cost. Improvements and further testing are considered. Such a system would clearly improve access to Virtual Reality technologies for those without the skills or physical ability to use a standard keyboard and mouse. It is an example of both Assistive Technology and Universal Design
Examining the socio-economic determinants of adoption of the 'Government Gateway' initiative in the UK
This paper empirically examines the impact of socio-economic determinants upon the adoption of a recent UK e-government initiative, the 'Government Gateway'. The data on five socio-economic characteristics was collected employing a postal survey. The findings of this research suggest that the three variables of age, gender and occupation significantly differentiated the adopters from the non-adopters of the Government Gateway, whilst education and income were found to be non-significant. The implications of the findings are discussed in the context of promoting the adoption of emerging Information and Communication Technologies (ICT) and reducing the digital divide against less privileged parts of the population
Recommended from our members
Classification of information systems research revisited: A keyword analysis approach
A number of studies have previously been conducted on keyword analysis in order to provide a comprehensive scheme to classify information systems (IS) research. However, these studies appeared prior to 1994, and IS research has clearly developed substantially since then with the emergence of areas such as electronic commerce, electronic government, electronic health and numerous others. Furthermore, the majority of European IS outlets - such as the European Journal of Information Systems and Information Systems Journal - were founded in the early 1990s, and keywords from these journals were not included in any previous work. Given that a number of studies have raised the issue of differences in European and North American IS research topics and approaches, it is arguable that any such analysis must consider sources from both locations to provide a representative and balanced view of IS classification. Moreover, it has also been argued that there is a need for further work in order to create a comprehensive keyword classification scheme reflecting the current state of the art. Consequently, the aim of this paper is to present the results of a keyword analysis utilizing keywords appearing in major peer-reviewed IS publications after the year 1990 through to 2007. This aim is realized by means of the two following objectives: (1) collect all keywords appearing in 24 peer reviewed IS journals after 1990; and (2) identify keywords not included in the previous IS keyword classification scheme. This paper also describes further research required in order to place new keywords in appropriate IS research categories. The paper makes an incremental contribution toward a contemporary means of classifying IS research. This work is important and useful for researchers in understanding the area and evolution of the IS field and also has implications for improving information search and retrieval activities
Recommended from our members
Evaluation by simulation of interpolation and acceleration algorithms for Stepper Motors
Stepper motors are used to control CNC machines for many applications. As well as following the required path precisely, it is also important that the motion be smooth and that the surface speed be controllable. Improved interpolation algorithms for individual straight lines and circular arcs have been developed using distance as a parameter [Chow et al, 2002], [Chow, 2003]. The algorithms control the motor by means of pulses and the generation of the pulse timings is based on the geometry of the shape. For high speeds it is necessary to allow smooth acceleration at the beginning and similar smooth deceleration at the end. Thus, appropriate acceleration and deceleration algorithms have been developed for use with the new interpolation algorithms. This paper describes how simulation has been used to evaluate the new algorithms and compare them with previous algorithms. The algorithms are described for the 2D case but the principle can be extended to 3D
Reanalysing Institutional and Remedial Constructive Trusts
It is often said that English law does not impose “remedial” constructive
trusts because it is manifestly inappropriate and fundamentally
unjustified to impose trusts through the exercise of judicial discretion and
with retrospective effect. This paper observes the definitional deficiencies in
this understanding, and reanalyses constructive trusts in terms of the rights
which they give effect to. This understanding reveals that English law sets
its face against the exercise of discretion in relation only to some “remedial”
constructive trusts and not others, and that the perceived difficulties with remedial
constructive trusts are often exaggerated. It ends by noting some crucial
implications of the re-analysis for the future development of the law
Parataxis and hypotaxis in modern Chinese
The paratactic features of Chinese has been specifically discussed and emphasized by linguists in the past decades and, particularly on the issue of Chinese-English translation, a comparative analysis on the paratactic Chinese and hypotactic English has always been made. It seems that parataxis and hypotaxis should stand on the opposite side, and Chinese is distinctive to rely on semantic or logical comprehension rather than connectives in the juxtaposition of syntactic units. But as a matter of linguistic development or influence by Western syntax as some may say, the increasing usage of grammatical markers and connectives in the linking or combination of phrases, clauses and sentences has indicated a certain hypotactic quality in modern Chinese. This article gives a summative review on the studies of parataxis and hypotaxis in Chinese in the past decades. It also describes variations in the two concepts, and disusses on certain considerations in defining the nature, functions and interrelationship of parataxis and hypotaxis in the Chinese language.postprin
Folk Adage in the Literati Notes of Tang Dynasty
Written in classical Chinese but enriched with vernacular expressions, slangs, dialectic expressions, loan words and so on, the Tang literati notes (biji 笔记) forms a rich and valuable corpus for studying the lexis of the Tang dynasty (618-907) and middle ancient Chinese. This paper, with the use of literary works and dictionaries as references, gives a lexical elaboration and analysis on certain folk adages (suyu 俗
语) used in the representative Tang literati notes, such as Feng Yan 封演’s Feng Shi Wen Jian Ji 封氏闻见记, Li Kuangyi 李匡乂’sZi Xia Ji 资暇集, Duan Chengshi 段成式’s You Yang Za Zu 酉阳杂俎and SuE 苏鹗’s Su Shi Yan Yi 苏氏演义. Nowadays there are still differences in stating the definition, components and characteristics of folk adage. In this paper, discussion is focused on those popular sayings quoted together with the word ‘su’ (俗) , such as ‘suyu’ (俗语), ‘su yue’ (俗曰), ‘su yun’ (俗云), and ‘su yan’ (俗言). Firstly, with reference to the examples founded in Tang notes, the paper examines and clarifies the characteristics of folk adage including its form and meaning, and then comments on the definition and coverage of folk adage with a comparative analysis on proverb (yanyu 谚语). With related to the meaning of folk adage, a sociocultural review on the reflection of common ideas and beliefs of the people of Tang and pre-Tang periods is also made.Secondly, examples are also taken to show their functions and significance in lexicography, which include serving as the first textual evidences, supplementing entries and explanations, advancing textual evidences, and supplementing textual evidences in dictionary entries. Lastly, the paper concludes with the contribution of such lingual material to the compilation and revision of dictionaries and to the study of the variation of folk adage.published_or_final_versio
- …