scholarly journals Developing Methods That Facilitate Coding and Analysis of Synchronous Conversations via Virtual Environments

2019 ◽  
Vol 18 ◽  
pp. 160940691984244
Author(s):  
Allison A. Lewinski ◽  
Ruth A. Anderson ◽  
Allison A. Vorderstrasse ◽  
Constance M. Johnson

Programs via the Internet are uniquely positioned to capture qualitative data. One reason is because the Internet facilitates the creation of a community of similar individuals who can exchange information and support related to living with a chronic illness. Synchronous conversations via the Internet can provide insight into real-time social interaction and the exchange of social support. One way to analyze interactions among individuals is by using qualitative methods such as content, conversation, or discourse analysis. This manuscript describes how we used content analysis with aspects from conversation and discourse analysis to analyze synchronous conversations via the Internet to describe what individuals talk about and how individuals talk in an Internet-mediated interaction. With the increase in Internet interventions that facilitate collection of real-time conversational data, this article provides insight into how combining qualitative methods can facilitate the coding and analysis of these complex data.

Molecules ◽  
2021 ◽  
Vol 26 (23) ◽  
pp. 7185
Author(s):  
Oliver Gould ◽  
Natalia Drabińska ◽  
Norman Ratcliffe ◽  
Ben de Lacy Costello

Mass spectrometry (MS) is an analytical technique that can be used for various applications in a number of scientific areas including environmental, security, forensic science, space exploration, agri-food, and numerous others. MS is also continuing to offer new insights into the proteomic and metabolomic fields. MS techniques are frequently used for the analysis of volatile compounds (VCs). The detection of VCs from human samples has the potential to aid in the diagnosis of diseases, in monitoring drug metabolites, and in providing insight into metabolic processes. The broad usage of MS has resulted in numerous variations of the technique being developed over the years, which can be divided into hyphenated and real-time MS techniques. Hyphenated chromatographic techniques coupled with MS offer unparalleled qualitative analysis and high accuracy and sensitivity, even when analysing complex matrices (breath, urine, stool, etc.). However, these benefits are traded for a significantly longer analysis time and a greater need for sample preparation and method development. On the other hand, real-time MS techniques offer highly sensitive quantitative data. Additionally, real-time techniques can provide results in a matter of minutes or even seconds, without altering the sample in any way. However, real-time MS can only offer tentative qualitative data and suffers from molecular weight overlap in complex matrices. This review compares hyphenated and real-time MS methods and provides examples of applications for each technique for the detection of VCs from humans.


2021 ◽  
pp. 220-240
Author(s):  
Anna G. Danilova ◽  
Olga V. Mitina

Relevance. In applied psychology, researchers are increasingly faced with the task of analyzing large amounts of text, both verbal and visual. For these purposes, various methods of analysis have been developed and various computer programs have been created. Objective. The possibilities of computerized qualitative text analysis are analyzed. The spectrum of problems solved by various methods of qualitative text analysis is considered. Methods. The theoretical analysis of classical methods of qualitative text analysis is carried out. The specificity of the method of computerized discourse analysis is analyzed. The Internet searched for the most popular programs for qualitative text analysis, considered the main options and requirements for working in the program. Results. Methods of content-, discourse-, intent-analysis, conversion and narrative analysis are briefly characterized. The computerized discourse analysis (CMDA) approach is described. An approach to solving problems of various methods of qualitative analysis of text in computer analysis of qualitative data (Computer Assisted Qualitative Data Analysis; CAQDAS) is presented. The possibilities of some software packages developed within the CAQDAS approach are considered. Conclusions. The advantages of using computerized discourse analysis are shown. The topic of research of methodological problems accompanying the use of CAQDAS is outlined.


Author(s):  
Yingli Wang ◽  
Mohamed Naim ◽  
Andrew Potter

As B2B e-business shifted to the Internet, Electronic Marketplaces (EMs) have grown rapidly in usage (Rask & Kragh, 2004). Definitions of an EM are diverse. One of the earliest and broadest definitions is offered by Bakos (1991), who referred to an EM as “an inter-organizational system that allows the participating buyers and sellers to exchange information about price and product offerings”. In the context of logistics, EMs can be termed Electronic Logistics Marketplaces (ELMs), referring to an electronic hub using web-based systems that link shippers and carriers together for the purpose of collaboration and/or trading (Wang, Potter, & Naim, 2007a). ELM is a context specific type of EM, which facilitates the provision of logistics services. Traditional forms of communication between a shipper and a carrier are rather fragmented when a shipper has a number of carriers to manage. Such one-toone exchanges can be costly and sometimes very time-consuming. Communicating through an ELM allows the connection of a number of shippers and carriers using a single interface, normally a Webbased system. This has brought advantages to organizations in terms of low cost inter-organization information connectivity, (near) real time visibility, and flexible partnership configurations.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Leigh Lawrence ◽  
Jian Wu

PurposeThis study analyzed Chinese higher education (HE) governance policies during the first four months of the 2020 COVID-19 pandemic, providing insight into HE management, policymaking and governance. This study also illuminates Chinese student experiences and real-time policy impact, providing insight into the effectiveness of HE crisis management.Design/methodology/approachUsing frameworks of real-time policy evaluation, this paper analyzed theoretical and realized policy impacts through the theoretical framing of temporality. Using real-time evaluation methods, this paper first identified HE policy priorities and then used a mixed-methods approach of “policy as discourse” analysis and a quantitative survey from Chinese HE students to assess the theoretical and realized impact of policies.FindingsAn analysis of HE policies identified three priorities: pastoral care, graduate employment and ideological education. Discourse analysis revealed each priority of HE policies was intrinsically linked to mitigating societal, economic and political consequences of the epidemic. Survey data revealed the perceived effectiveness of policies mirrored China's top-down government structure. Additionally, students expressed strong support in the central government's crisis management, despite relatively little realized policy impact.Originality/valueThis paper presents a timely review of HE governance during a global pandemic by offering a snapshot of HE crisis management and contributing to the literature surrounding China's ongoing HE centralization. This paper also provides unique insight into HE's role in state development, variations between prescriptive and realized policy impact and the “crisis as opportunity” paradox in a contemporary setting.


2019 ◽  
Vol 1 (4) ◽  
pp. 23-32 ◽  
Author(s):  
A. Tikhomirova ◽  
Chuanmin Shuai

Nowadays the Internet occupies the primary place in many people’s lives. It gives people many different opportunities including online shopping. The deep understanding of all the elements of trust building mechanisms is essential in order to guarantee future prosperous development of the e-commerce sphere as trust seems the key point of e-commerce success. The current study aims to assess trust building mechanisms of online shopping, namely customers’ comments, using the linguistic tool. By adopting the discourse analysis methodology this paper explores the language units used in the comments. First of all, the importance of feedbacks (customers’ comments) was assessed by means of self-compiled questionnaire and the results of the analyses indicate that feedbacks were proved to be significant for customers while forming the buying intention. Then qualitative data was collected from Amazon website. Customers’ comments were collected, systematized and grouped according to the specification of the comment. The following groups were singled out: attitude, duration of usage, quality, price, purpose of usage, function. Comments were divided into positive and negative as well and later on analyzed by means of discourse analysis. Two types of comments were pointed out, namely explanation and evidence (photo). Special features of online comments were pointed out.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4736
Author(s):  
Sk. Tanzir Mehedi ◽  
Adnan Anwar ◽  
Ziaur Rahman ◽  
Kawsar Ahmed

The Controller Area Network (CAN) bus works as an important protocol in the real-time In-Vehicle Network (IVN) systems for its simple, suitable, and robust architecture. The risk of IVN devices has still been insecure and vulnerable due to the complex data-intensive architectures which greatly increase the accessibility to unauthorized networks and the possibility of various types of cyberattacks. Therefore, the detection of cyberattacks in IVN devices has become a growing interest. With the rapid development of IVNs and evolving threat types, the traditional machine learning-based IDS has to update to cope with the security requirements of the current environment. Nowadays, the progression of deep learning, deep transfer learning, and its impactful outcome in several areas has guided as an effective solution for network intrusion detection. This manuscript proposes a deep transfer learning-based IDS model for IVN along with improved performance in comparison to several other existing models. The unique contributions include effective attribute selection which is best suited to identify malicious CAN messages and accurately detect the normal and abnormal activities, designing a deep transfer learning-based LeNet model, and evaluating considering real-world data. To this end, an extensive experimental performance evaluation has been conducted. The architecture along with empirical analyses shows that the proposed IDS greatly improves the detection accuracy over the mainstream machine learning, deep learning, and benchmark deep transfer learning models and has demonstrated better performance for real-time IVN security.


Sign in / Sign up

Export Citation Format

Share Document