scholarly journals Leading with digital in an age of supercomplexity

Author(s):  
Lawrie Phipps ◽  
Donna M Lanclos

Across education all aspects of practice, including teaching, research, public engagement and administration, are taking place increasingly against a digital backdrop. As digital becomes widely recognized as both key element of enabling institutional change, and creating challenges for all institutional activities, Jisc have developed a digital leaders course to engage delegates with their own digital practices, and help them in applying tools and methods to both support their own development and leverage digital in their organization. This short paper reports on the initial courses and some of the delegate reactions, drivers to participate in the course and it also outlines the structure of the course and the underpinning approaches taken. Barnett’s definition of supercomplexity, a time of uncertainty, unpredictability, challenge and change frames the nature of the education landscape faced by institutions well. However, through the digital leaders course, Jisc seeks to both frame the challenges created by digital, and also show digital as providing the capacity and capabilities to respond to supercomplexity.

Author(s):  
M. Ferrara ◽  
M. Trombetti

AbstractLet G be an abelian group. The aim of this short paper is to describe a way to identify pure subgroups H of G by looking only at how the subgroup lattice $$\mathcal {L}(H)$$ L ( H ) embeds in $$\mathcal {L}(G)$$ L ( G ) . It is worth noticing that all results are carried out in a local nilpotent context for a general definition of purity.


2019 ◽  
Vol 47 (4) ◽  
pp. 339-349
Author(s):  
Christian Schneickert ◽  
Alexander Lenger ◽  
Leonie C. Steckermeier ◽  
Tobias Rieder

We discuss findings from a survey of sociology students in Germany and consequences for teaching. We focus on the de facto formation of a sociological canon, the relation between theories and methods, and effects of social and political characteristics on student’s scientific preferences. Our findings suggest that irrespective of an agreement of the sociological professionals on a common definition of a core, a de facto canon of theories and methods exists in teaching practices. Moreover, specific relations between sociological theories and methods occur in the data. Both should be recognized in the discussion about curricula design, especially concerning teaching research methods. Finally, we discovered effects of gender and political attitude on students’ preferences for theories and methods. Such differences might be associated with different motivations for studying sociology and labor market orientation. This should be considered in curricula design as well, especially at the local level of departments.


2009 ◽  
Vol 59 (3) ◽  
pp. 576-595
Author(s):  
Robert Armstrong

Abstract This paper examines the forces at work in shaping the definition of mining rights in Quebec at the end of the 19th century. Using the Davis-North model of institutional change and some insights from the theory of rent-seeking, the author attempts to identify the origins of the provincial legal framework which has been in force since the turn of the century.


2015 ◽  
Vol 30 (4) ◽  
pp. 375-393 ◽  
Author(s):  
Jorge J. Gómez-Sanz ◽  
Rubén Fuentes-Fernández

AbstractFor many years, the progress in agent-oriented development has focused on tools and methods for particular development phases. This has not been enough for the industry to accept agent technology as we expected. Our hypothesis is that the Agent-Oriented Software Engineering (AOSE) community has not recognized the kind of development methods that industry actually demands. We propose to analyze this hypothesis starting with a more precise definition of what an AOSE methodology should be. This definition is the first step for a review of the current progress of an illustrative selection of methodologies, looking for missing elements and future lines of improvement. The result is an account of how well the AOSE community is meeting the software lifecycle needs. It can be advanced that AOSE methodologies are far from providing all the answers industry requires and that effort has grounded mainly in requirements, design, and implementation phases.


TESTFÓRUM ◽  
2017 ◽  
Vol 6 (10) ◽  
pp. 4-13
Author(s):  
Lenka Krajčíková

Predkladaný krátky článok pojednáva o testovaní kognitívneho štýlu závislosti/nezávislosti na poli podľa Witkina. Tento kognitívny štýl popísaný v 50. rokoch bol v niekoľkých posledných dekádach vystavený kritike, ktorá sa na jednej strane týka samotnej definície kognitívneho štýlu, na strane druhej i metód, ktoré sú k testovaniu tohto štýlu používané. V práci sa čitateľ dozvie ako o metódach testovania závislosti/nezávislosti na poli tak o kritike tohto konceptu. Hlavným zámerom článku je poskytnúť historický exkurz do testovania kognitívneho štýlu závislosti/nezávislosti na poli pomocou testu k tomu pôvodne určenému (Embedded Figures Test). Čitateľ sa dozvie o nejednoznačnosti použitia testu EFT a pochybnostiach o tom, že skutočne testuje spomínaný kognitívny štýl. Test samotný bude predstavený v novom svetle potenciálne zaujímavého nástoja na testovanie priestorovej kognitívnej schopnosti či všeobecnej inteligencie, čo je však nutné ďalším výskumom objasniť. Presented short paper deals with testing of cognitive style of field dependence/independence by Herman Witkin. This cognitive style described in fifties was wildly criticized in last couple of decades. The criticism was aimed towards the definition of a cognitive style and also towards methods evaluating and testing this so called cognitive style. The paper describes various methods of testing this style and provides brief overview of a criticism of the concept. The main goal of this paper is to provide a historical overview of testing cognitive style of field dependence/independence and to evaluate test created for that purpose (Embedded Figures Test). The reader will find out that EFT is not a completely valid method of testing cognitive style mentioned above and there are some doubts about what this test is really measuring. EFT will be introduced from a slightly different angle, as an interesting method of testing spatial cognitive ability or general intelligence, but these new options of use of EFT require further research. 


2020 ◽  
Vol 11 (3) ◽  
pp. 683-692
Author(s):  
Giovanni SILENO

This short paper aims to unpack some of the assumptions underlying the “Policy and Investment Recommendation for Trustworthy AI” provided by the High-Level Expert Group on Artificial Intelligence (AI) appointed by the European Commission. It elaborates in particular on three aspects: on the technical-legal dimensions of trustworthy AI; on what we mean by AI; and on the impact of AI. The consequent analysis results in the identification, amongst others, of three recurrent simplifications, respectively concerning the definition of AI (sub-symbolic systems instead of “intelligent” informational processing systems), the interface between AI and institutions (neatly separated instead of continuity) and a plausible technological evolution (expecting a plateau instead of a potentially near-disruptive innovation).


Author(s):  
PETER MASSOPUST ◽  
BRIGITTE FORSTER

Fractional B-splines are a natural extension of classical B-splines. In this short paper, we show their relations to fractional divided differences and fractional difference operators, and present a generalized Hermite–Genocchi formula. This formula then allows the definition of a larger class of fractional B-splines.


Author(s):  
Mihail Pavlik ◽  
Konstantin Borichev

The article is devoted to the consideration of the current phenomenon – «the terrorism of individuals». In particular, it is presented the definition of the concept in question, its main specificity and current trends. The article describes the terrorist acts committed by loner terrorists in the period from 2017 to 2020 in Europe, as well as an analysis of similar crimes from 2000 to 2014. Special attention is paid to the role of international terrorist organizations in their work with their followers in the form of individual terrorists.The features of preparation of the investigated terrorist acts, including the means, tools and methods of their commission, are considered. It was done the analysis of the ideological component in the illegal activities of loner terrorists, and were identified the main directions of their terrorist ideology. The role of the Internet, social networks and messengers in terrorist activities was studied. Proposals to counteract the terrorism of individuals and improve the effectiveness of counter-terrorism measures in general are presented. As a result of the study, the fundamental directions of anti-terrorist activities in Russia in the sphere of countering the terrorist threat posed by loner terrorists were identified. Special attention is paid to the prevention of lone-person terrorism and the participation of representatives of public and religious associations and national diasporas in this activity.The features of preparation of the investigated terrorist acts, including the means, tools and methods of their commission, are considered. It was done the analysis of the ideological component in the illegal activities of loner terrorists, and were identified the main directions of their terrorist ideology. The role of the Internet, social networks and messengers in terrorist activities was studied. Proposals to counteract the terrorism of individuals and improve the effectiveness of counter-terrorism measures in general are presented. As a result of the study, the fundamental directions of anti-terrorist activities in Russia in the sphere of countering the terrorist threat posed by loner terrorists were identified. Special attention is paid to the prevention of lone-person terrorism and the participation of representatives of public and religious associations and national diasporas in this activity.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8474
Author(s):  
Mubarak Alotaibi ◽  
Barmak Honarvar Shakibaei Asli ◽  
Muhammad Khan

Non-Invasive Inspection (NII) has become a fundamental tool in modern industrial maintenance strategies. Remote and online inspection features keep operators fully aware of the health of industrial assets whilst saving money, lives, production and the environment. This paper conducted crucial research to identify suitable sensing techniques for machine health diagnosis in an NII manner, mainly to detect machine shaft misalignment and gearbox tooth damage for different types of machines, even those installed in a hostile environment, using literature on several sensing tools and techniques. The researched tools are critically reviewed based on the published literature. However, in the absence of a formal definition of NII in the existing literature, we have categorised NII tools and methods into two distinct categories. Later, we describe the use of these tools as contact-based, such as vibration, alternative current (AC), voltage and flux analysis, and non-contact-based, such as laser, imaging, acoustic, thermographic and radar, under each category in detail. The unaddressed issues and challenges are discussed at the end of the paper. The conclusions suggest that one cannot single out an NII technique or method to perform health diagnostics for every machine efficiently. There are limitations with all of the reviewed tools and methods, but good results possible if the machine operational requirements and maintenance needs are considered. It has been noted that the sensors based on radar principles are particularly effective when monitoring assets, but further comprehensive research is required to explore the full potential of these sensors in the context of the NII of machine health. Hence it was identified that the radar sensing technique has excellent features, although it has not been comprehensively employed in machine health diagnosis.


Sign in / Sign up

Export Citation Format

Share Document