scholarly journals Users roles identification on online crowdsourced Q&A platforms and encyclopedias: a survey

Author(s):  
Akrati Saxena ◽  
Harita Reddy

AbstractOnline informal learning and knowledge-sharing platforms, such as Stack Exchange, Reddit, and Wikipedia have been a great source of learning. Millions of people access these websites to ask questions, answer the questions, view answers, or check facts. However, one interesting question that has always attracted the researchers is if all the users share equally on these portals, and if not then how the contribution varies across users, and how it is distributed? Do different users focus on different kinds of activities and play specific roles? In this work, we present a survey of users’ social roles that have been identified on online discussion and Q&A platforms including Usenet newsgroups, Reddit, Stack Exchange, and MOOC forums, as well as on crowdsourced encyclopedias, such as Wikipedia, and Baidu Baike, where users interact with each other through talk pages. We discuss the state of the art on capturing the variety of users roles through different methods including the construction of user network, analysis of content posted by users, temporal analysis of user activity, posting frequency, and so on. We also discuss the available datasets and APIs to collect the data from these platforms for further research. The survey is concluded with open research questions.

2022 ◽  
Author(s):  
Paula Delgado-Santos ◽  
Giuseppe Stragapede ◽  
Ruben Tolosana ◽  
Richard Guest ◽  
Farzin Deravi ◽  
...  

The number of mobile devices, such as smartphones and smartwatches, is relentlessly increasing to almost 6.8 billion by 2022, and along with it, the amount of personal and sensitive data captured by them. This survey overviews the state of the art of what personal and sensitive user attributes can be extracted from mobile device sensors, emphasising critical aspects such as demographics, health and body features, activity and behaviour recognition, etc. In addition, we review popular metrics in the literature to quantify the degree of privacy, and discuss powerful privacy methods to protect the sensitive data while preserving data utility for analysis. Finally, open research questions are presented for further advancements in the field.


Author(s):  
Jacques Thomassen ◽  
Carolien van Ham

This chapter presents the research questions and outline of the book, providing a brief review of the state of the art of legitimacy research in established democracies, and discusses the recurring theme of crisis throughout this literature since the 1960s. It includes a discussion of the conceptualization and measurement of legitimacy, seeking to relate legitimacy to political support, and reflecting on how to evaluate empirical indicators: what symptoms indicate crisis? This chapter further explains the structure of the three main parts of the book. Part I evaluates in a systematic fashion the empirical evidence for legitimacy decline in established democracies; Part II reappraises the validity of theories of legitimacy decline; and Part II investigates what (new) explanations can account for differences in legitimacy between established democracies. The chapter concludes with a short description of the chapters included in the volume.


2021 ◽  
Vol 16 (2) ◽  
pp. 111-135
Author(s):  
Emilio M. Sanfilippo

Information entities are used in ontologies to represent engineering technical specifications, health records, pictures or librarian data about, e.g., narrative fictions, among others. The literature in applied ontology lacks a comparison of the state of the art, and foundational questions on the nature of information entities remain open for research. The purpose of the paper is twofold. First, to compare existing ontologies with both each other and theories proposed in philosophy, semiotics, librarianship, and literary studies in order to understand how the ontologies conceive and model information entities. Second, to discuss some open research challenges that can lead to principled approaches for the treatment of information entities, possibly by getting into account the variety of information entity types found in the literature.


2020 ◽  
pp. 1207-1221
Author(s):  
Carlos E. Jiménez-Gómez

Despite its origins, openness in the judiciary has expanded beyond transparency and, therefore, beyond the common law open justice principle. Several initiatives worldwide are echoing this trend and a new term, open judiciary, is arising as a way to address openness in the justice field. This chapter gives an overview of open judiciary initiatives worldwide, focusing on some of the most successful, in order to identify drivers of adoption, critical success factors, and preliminary results. The research is embedded in a broader exploratory study on the state of the art of open judiciary. The chapter is addressed to answer two of the research questions: What are some learning practices that can be identified worldwide in relation to openness in the judiciary? What are some of the most important lessons that can be learnt from these practices?


2017 ◽  
Vol 24 (4) ◽  
pp. 529-540
Author(s):  
Paul Eisenberg

Purpose This paper aims to approach fundamental topics of financial crime and the law. What does constitute financial crime? Which field of law is best suited to address the threats of transgression by financial executives? What does motivate highly rewarded financiers to become white collar criminals? Design/methodology/approach To answer these research questions, contemporary theories of criminology in general and of white collar crime in particular, as well as theories on motivation, are critically discussed. Benefits and limitations of the theories in use are exemplified on the background of the London Interbank Offered Rate (LIBOR) scandal. Findings The paper criticises that the state-of-the-art theories are not able to embrace financial criminality in its entirety. A provoking pace for further research might be that of psychopathic disorders among white collar criminals. Thus, white collar crime maintains its challenging character. Originality/value This paper provides a thorough testing of multidisciplinary theories that emerged over the past decades against the recent LIBOR scandal. The research questions addressed and the methodologies applied provide a framework for the assessment of the prevailing theories against other financial scandals.


Author(s):  
Carlos E. Jiménez-Gómez

Despite its origins, openness in the judiciary has expanded beyond transparency and, therefore, beyond the common law open justice principle. Several initiatives worldwide are echoing this trend and a new term, open judiciary, is arising as a way to address openness in the justice field. This chapter gives an overview of open judiciary initiatives worldwide, focusing on some of the most successful, in order to identify drivers of adoption, critical success factors, and preliminary results. The research is embedded in a broader exploratory study on the state of the art of open judiciary. The chapter is addressed to answer two of the research questions: What are some learning practices that can be identified worldwide in relation to openness in the judiciary? What are some of the most important lessons that can be learnt from these practices?


1988 ◽  
Vol 9 ◽  
pp. 42-53
Author(s):  
Bogdan Krakowian

The early development of second language acquisition [SLA] research in the area of morphology and syntax can be traced in some excellent publications both exemplifying and evaluating the state of the art in this area (e.g., Anderson 1981, Davies, Criper, and Howatt 1984, Hatch 1983, Wode 1981b). The research questions identified and pursued at that time have continued to occupy researchers. (The ones which are the most important and relevant for the discussion here are as follows: 1 the problem of regularity in interlanguage [IL] morphology and syntax; 2) the contribution of Universal Grammar to SLA, and 3) variability in IL performance. The problems enumerated above will provide a framework for the discussion of the acquisition of morphology and syntax. Some additional comments on other, related issues will be included.


2020 ◽  
Author(s):  
Marco Chiesa ◽  
Andrzej Kamisiński ◽  
Jacek Rak ◽  
Gábor Rétvári ◽  
Stefan Schmid

In order to meet their stringent dependability requirements, most modern communication networks support fast-recovery mechanisms in the data plane. While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much attention in the literature. This survey presents a systematic, tutorial-like overview of packet-based fast-recovery mechanisms in the data plane, focusing on concepts but structured around different networking technologies, from traditional link-layer and IP-based mechanisms, over BGP and MPLS to emerging software-defined networks and programmable data planes. We examine the evolution of fast-recovery standards and mechanisms over time, and identify and discuss the fundamental principles and algorithms underlying different mechanisms. We then present a taxonomy of the state of the art and compile open research questions.<br>


Sign in / Sign up

Export Citation Format

Share Document