Collecting Large-scale Comparative Text Data on Legislative Debates

2021 ◽  
pp. 91-109
Author(s):  
Jan Schwalbach ◽  
Christian Rauh

Parliamentary speeches present one of the most consistently available sources of information about the political priorities, actor positions, and conflict structures in democratic states. Recent advances of automated text analysis offer more and more tools to tap into this information reservoir in a systematic manner. However, collecting the high-quality text data needed for unleashing the comparative potential of the various text analysis algorithms out there is a costly endeavor and faces various pragmatic hurdles. Against this challenge, this chapter offers three contributions. First, we outline best practice guidelines and useful tools for researchers wishing to collect or to extend existing legislative debate corpora. Second, we present an extended version of the ParlSpeech Corpus. Third, we highlight the difficulties of comparing text-as-data outputs across different parliaments, pointing to varying languages, varying traditions and conventions, and varying metadata availability.

Author(s):  
Tracey Varker ◽  
Kari McGregor ◽  
David J. Pedder ◽  
Ros Lethbridge ◽  
Genevieve Grant ◽  
...  

Abstract Objective: Intentional vehicular assaults on civilians have become more frequent worldwide, with some resulting in mass casualties, injuries, and traumatized witnesses. Health care costs associated with these vehicular assaults usually fall to compensation agencies. There is, however, little guidance around how compensation agencies should respond to mental and physical injury claims arising from large-scale transport incidents. Methods: A Delphi review methodology was used to establish expert consensus recommendations on the major components of “no fault” injury claim processes for mental and physical injury. Results: Thirty-three international experts participated in a 3-round online survey to rate their agreement on key statements generated from the literature. Consensus was achieved for 45 of 60 (75%) statements, which were synthesized into 36 recommendations falling within the domains of (1) facilitating claims, (2) eligibility rules, (3) payments and benefits for clients, (4) claims management procedures, (5) making and explaining decisions, (6) support and information resources for clients, (7) managing scheme staff and organizational response, (8) clients with special circumstances, and (9) scheme values and integrity. Conclusions: The recommendations present an opportunity for agencies to review their existing claims management systems and procedures. They also provide the basis for the development of best practice guidelines, which may be adapted for application to compensation schemes in different contexts worldwide.


Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu

Cloud computing is an emerging computing paradigm which introduces novel opportunities to establish large scale, flexible computing infrastructures. However, security underpins extensive adoption of Cloud computing. This paper presents efforts to address one of the significant issues with respect to security of Clouds i.e. intrusion detection and severity analysis. An abstract model for integrated intrusion detection and severity analysis for Clouds is proposed to facilitate minimal intrusion response time while preserving the overall security of the Cloud infrastructures. In order to assess the effectiveness of the proposed model, detailed architectural evaluation using Architectural Trade-off Analysis Model (ATAM) is used. A set of recommendations which can be used as a set of best practice guidelines while implementing the proposed architecture is discussed.


Author(s):  
Lynne Siemens ◽  
The INKE Research Group

Many academic teams and granting agencies undergo a process of reflection at the completion of research projects to understand lessons learned and develop best practice guidelines. Generally completed at the project’s end, these reviews focus on the actual research work accomplished with little discussion of the work relationships and process involved. As a result, some hard-earned lessons are forgotten or minimized through the passage of time. Additional learning about the nature of collaboration may be gained if this type of reflection occurs during the project’s life. Building on earlier examinations of INKE, this paper contributes to that discussion with an exploration of seventh and final year of a large-scale research project.Implementing New Knowledge Environment (INKE) serves as a case study for this research. Members of the administrative team, researchers, postdoctoral fellows, graduate research assistants, and others are asked about their experiences collaborating within INKE on an annual basis in order to understand the nature of collaboration and ways that it may change over the life of a long-term grant. Interviewees continue to outline benefits for collaboration within INKE while admitting that there continue to be challenges. They also outline several lessons learned which will be applied to the next project.


2019 ◽  
Author(s):  
Daschel Franz ◽  
Heather Elizabeth Marsh ◽  
Jason I Chen ◽  
Alan R Teo

UNSTRUCTURED As Facebook continues to grow its number of active users, the potential to harness data generated by Facebook users also grows. As much of Facebook users’ activity consists of creating (and commenting on) written posts, the potential use of text data for research is enormous. However, conducting a content analysis of text from Facebook users requires adaptation of research methods used for more traditional sources of qualitative data. Furthermore, best practice guidelines to assist researchers interested in conducting qualitative studies using data derived from Facebook are lacking. The purpose of this primer was to identify opportunities, as well as potential pitfalls, of conducting qualitative research with Facebook users and their activity on Facebook and provide potential options to address each of these issues. We begin with an overview of information obtained from a literature review of 23 studies published between 2011 and 2018 and our own research experience to summarize current approaches to conducting qualitative health research using data obtained from Facebook users. We then identify potential strategies to address limitations related to current approaches and propose 5 key considerations for the collection, organization, and analysis of text data from Facebook. Finally, we consider ethical issues around the use and protection of Facebook data obtained from research participants. In this primer, we have identified several key considerations that should aid health researchers in the planning and execution of qualitative studies involving content analysis of text data from Facebook users.


2021 ◽  
Vol 11 (10) ◽  
pp. 652
Author(s):  
Theresa Davey ◽  
José Victorio Salazar Luces ◽  
Rebecca Davenport

Equitable access to high-quality higher education is in line with the United Nations Sustainable Development Goals 4, 5, and 10, which indicate that it is crucial for a future sustainable society. Globalisation and reductions in systemic barriers to university admission are creating increasingly diverse higher education classrooms, but traditional education methods may unfairly disadvantage some groups of students. Creating equity in access to high-quality education requires teaching approaches that are considerate of each student’s individual sociocultural context as it affects their educational attainment. Building on discipline-based education research (DBER) principles in science, technology, engineering, and mathematics (STEM) education, a modified holistic approach is proposed that primarily centres on students and tailors the teaching methods to the needs of the individuals and the dynamic of the whole class. This work demonstrates that educational attainment and student confidence was improved by applying an individual-centred teaching approach in a highly diverse undergraduate engineering classroom. Trials of this approach in a pilot classroom showed clear and consistent improvement over standard active learning approaches. Best practice guidelines for individual-centred teaching in STEM classrooms are provided. Further work is needed to examine the efficacy of this approach in a generalised setting, but the positive outcomes for student attainment are in line with existing research in the literature. The best practice guidelines presented herein may serve as a starting point for other educators to become more aware of the sociocultural needs of their individual students and classrooms, which may result in a move towards equity in STEM higher education.


2011 ◽  
Vol 1 (1) ◽  
pp. 1-16 ◽  
Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu

Cloud computing is an emerging computing paradigm which introduces novel opportunities to establish large scale, flexible computing infrastructures. However, security underpins extensive adoption of Cloud computing. This paper presents efforts to address one of the significant issues with respect to security of Clouds i.e. intrusion detection and severity analysis. An abstract model for integrated intrusion detection and severity analysis for Clouds is proposed to facilitate minimal intrusion response time while preserving the overall security of the Cloud infrastructures. In order to assess the effectiveness of the proposed model, detailed architectural evaluation using Architectural Trade-off Analysis Model (ATAM) is used. A set of recommendations which can be used as a set of best practice guidelines while implementing the proposed architecture is discussed.


10.2196/13544 ◽  
2019 ◽  
Vol 21 (8) ◽  
pp. e13544 ◽  
Author(s):  
Daschel Franz ◽  
Heather Elizabeth Marsh ◽  
Jason I Chen ◽  
Alan R Teo

As Facebook continues to grow its number of active users, the potential to harness data generated by Facebook users also grows. As much of Facebook users’ activity consists of creating (and commenting on) written posts, the potential use of text data for research is enormous. However, conducting a content analysis of text from Facebook users requires adaptation of research methods used for more traditional sources of qualitative data. Furthermore, best practice guidelines to assist researchers interested in conducting qualitative studies using data derived from Facebook are lacking. The purpose of this primer was to identify opportunities, as well as potential pitfalls, of conducting qualitative research with Facebook users and their activity on Facebook and provide potential options to address each of these issues. We begin with an overview of information obtained from a literature review of 23 studies published between 2011 and 2018 and our own research experience to summarize current approaches to conducting qualitative health research using data obtained from Facebook users. We then identify potential strategies to address limitations related to current approaches and propose 5 key considerations for the collection, organization, and analysis of text data from Facebook. Finally, we consider ethical issues around the use and protection of Facebook data obtained from research participants. In this primer, we have identified several key considerations that should aid health researchers in the planning and execution of qualitative studies involving content analysis of text data from Facebook users.


2018 ◽  
Vol 2 ◽  
pp. e28122
Author(s):  
Erika Gardner

With the continuous evolution of permitting regulations the Department of Botany at the National Museum of Natural History (NMNH) in Washington D.C., invited an agent from the United States Department of Agriculture (USDA), Animal and Plant Health Inspection Service (APHIS) to discuss requirements for obtaining import permits for plant specimens. This meeting lead to the planning of restructuring existing procedures, workflows and modifications to the physical workspaces within our facilities. It also prompted the collection management staff to be well versed in the current regulations. APHIS requires individuals applying for a permit to submit a Standard Operational Procedure document (SOP) of their facilities. The APHIS agent will review the sterile entry procedures in the SOP and determine if the facility qualifies. Before we drafted our final SOP, we researched SOPs from other APHIS compliant herbaria. Most of the facilities at NMNH, constructed in 1910 and 1965, predates climate control and pest management best practice standards. After meeting with the APHIS agent, we reevaluated our packing and unpacking procedures. It was apparent that the frontline to combat pests should be as close to the shipping office entry point as possible. The ideal room is our drying room located next to the shipping office. Other room renovations where specimen processing occurs will be discussed in detail. PowerPoint is a major tool that helped with the visualization of the renovations. However, modifying and renovating spaces within the museum is not an easy feat because of the large scale coordinating efforts within the institution. Beyond the physical changes, there has been unexpected changes as to the role of collection staff in the permitting process. The APHIS requirements have created new challenges. Collection management staff are now sources of information about what collectors need to know before applying for a permit. Collection staff must also know about the various tools available for answering collectors’ questions, such as being well versed in the USDA Phytosanitary export database (PExD). Overall, new restrictions and guild lines create unexpected changes for the overall form and function of collection management.


2020 ◽  
Vol 11 (4) ◽  
pp. 184-189
Author(s):  
Marie Jones ◽  
David Arnfield ◽  
Paul Barber

The production of high-quality diagnostic blood smears is a skill often overlooked in first opinion veterinary practices despite their usefulness in providing diagnostic information that would otherwise be omitted from results generated from automated analysers. Well made, well stained diagnostic blood smears can instantly provide vital information regarding the health of the patient and even provide a diagnosis. However, making quality blood smears is open to intraspecific and interspecific observer error and therefore this article aims to provide best practice guidelines along with a comprehensive troubleshooting guide to aid veterinary clinicians, nurses, technicians and students in the production of diagnostic blood smears.


Sign in / Sign up

Export Citation Format

Share Document