scholarly journals Detection of Hidden Knowledge Using a Citation-Based Approach Based on Swanson's ABC Model

2015 ◽  
Vol 32 (2) ◽  
pp. 87-103
Author(s):  
Jung Eun Hahm ◽  
Min Song
Keyword(s):  
Author(s):  
Gennady V. Kanygin ◽  
Maria S. Poltinnikova

The article opens a cycle of publications, which analyze the similarities and differences between the two wide spread modern approaches to the description of society - sociological and informational ones. Both approaches have the same methodological problem to be solved. The problem of expressing hidden knowledge about society that participants in social processes operate with the help of natural language in the course of social communication. In order to harmonize sociological and informational approaches of describing society, it was proposed any natural language statements involved in describing society to be arranged according to the basic principle of information technology - modularity. The proposed way of harmonizing informational and sociological methods of building knowledge about society is invoked by the need to solve two scientific problems formulated in sociology itself - the constructability of social objects and the complexity of social relationships. The paper's methodological proposals are embodied in their computer realization, which practical application is demonstrated in other publications of the authors.


Author(s):  
Claire Taylor

The chapter examines a major corruption scandal that involved the Athenian orator Demosthenes and an official of Alexander the Great. This episode reveals how tensions between individual and collective decision-making practices shaped Athenian understandings of corruption and anticorruption. The various and multiple anticorruption measures of Athens sought to bring ‘hidden’ knowledge into the open and thereby remove information from the realm of individual judgment, placing it instead into the realm of collective judgment. The Athenian experience therefore suggests that participatory democracy, and a civic culture that fosters political equality rather than reliance on individual expertise, provides a key bulwark against corruption.


Author(s):  
Robert Wiśniewski

Christians always admired and venerated martyrs who died for their faith, but for a long time thought that the bodies of martyrs should remain undisturbed in their graves. Initially, the Christian attitude toward the bones of the dead, whether a saint’s or not, was that of respectful distance. This book tells how, in the mid-fourth century, this attitude started to change, swiftly and dramatically. The first chapters show the rise of new beliefs. They study how, when, and why Christians began to believe in the power of relics, first, over demons, then over physical diseases and enemies; how they sought to reveal hidden knowledge at the tombs of saints and why they buried the dead close to them. An essential element of this new belief was a strong conviction that the power of relics was transferred in a physical way and so subsequent chapters study relics as material objects. The book seeks to show what the contact with relics looked like and how close it was. Did people touch, kiss, or look at the very bones, or just at reliquaries which contained them? When did the custom of dividing relics appear? Finally, the book deals with discussions and polemics concerning relics and tries to find out how strong was the opposition which this new phenomenon had to face, both within and outside Christianity on the way to relics becoming an essential element of medieval religiosity.


2021 ◽  
Vol 19 ◽  
pp. 62-71
Author(s):  
Dechao Bu ◽  
Yan Xia ◽  
JiaYuan Zhang ◽  
Wanchen Cao ◽  
Peipei Huo ◽  
...  

2018 ◽  
Vol 48 (2) ◽  
pp. 119-128
Author(s):  
Martin Nakata ◽  
Vicky Nakata ◽  
Andrew Day ◽  
Gregory Martin ◽  
Michael Peachey

This article presents an analysis of statements from Indigenous students in an Australian university that describe how they use supplementary tutors. The analysis provides some evidence that students use tutors for much more than the prescribed remedial purpose to assist with gaps in assumed academic knowledge and skills to prevent subject failures. Students also use tutors to access hidden knowledge and develop capabilities that assist their progress from dependence on assistance to independence in learning. Our analysis has implications for the conceptualisation and management of supplementary tutoring for Indigenous students.


Religions ◽  
2021 ◽  
Vol 12 (7) ◽  
pp. 492
Author(s):  
Scott B. Noegel ◽  
Corinna E. Nichols

This article presents evidence for a previously unrecognized literary device in the Book of Proverbs, in which texts that cluster references to animals also contain additional paronomastic allusions to animals. This device accords with the proverbs’ instruction to search for hidden knowledge, and resonates with their emphasis on the study of wild animals as a source of divine wisdom. The device also appears in psalms and prophecies, where it generally entails references to domesticated animals; here, the function appears to be rhetorical or performative. These groupings of concealed allusions to animals also add to the growing number of examples of the textual device of clustering.


2011 ◽  
Vol 204-210 ◽  
pp. 1697-1700 ◽  
Author(s):  
Yu Jie Zheng

Radar EW system combat effectiveness evaluation is a essential link to Radar system Demonstration, mainly give service to selection, optimization and key factors analysis of Weapon equipment scheme. In this paper, we introduce the Bayesian network model into the area of Radar EW system combat effectiveness evaluation and put forward the concept of combat effectiveness evaluation model based on Bayesian network. The ability to express complex relationship, the ability to express the uncertainty of probability, and the reasoning functions. By learning from Expertise and Simulation data, excavating the hidden knowledge included in both of them, we can build the combat efficiency Analysis model, and then carry out efficient analysis.


2021 ◽  
Vol 138 ◽  
pp. 3-14
Author(s):  
Alexander Bystritsky ◽  
Norman M. Spivak ◽  
Bianca H. Dang ◽  
Sergio A. Becerra ◽  
Margaret G. Distler ◽  
...  
Keyword(s):  

2014 ◽  
Vol 27 (2) ◽  
pp. 197-227 ◽  
Author(s):  
Demosthenes Akoumianakis

Purpose – The purpose of this paper is to investigate boundary spanning tactics in a cross-organizational virtual alliance and discuss the analytical value of “digging” into technology for excavating boundaries and understanding their dynamic and emergent features. Design/methodology/approach – Although boundaries, their role and implications have been extensively investigated across a variety of online settings, the results are inconclusive as to the features of technology that create, dissolve or re-locate boundaries. This is attributed to the fact that in most cases technology is addressed as a black box – a discrete artefact of practice – without seeking justification for the inscribed functions that enable or constrain use. The paper overcomes these shortcomings by analysing digital trace data compiled through a virtual ethnographic assessment of a cross-organizational tourism alliance. Data comprise electronic traces of online collaboration whose interpretive capacity is augmented using knowledge visualization techniques capable of revealing dynamic and emergent features of boundary spanning. Findings – Boundary spanning in virtual settings entails micro-negotiations around several types of boundaries. Some of them are either enforced by or inscribed into technology, while others are enacted in practice. Knowledge visualization of digital trace data allows “excavation” of these boundaries, assessment of their implications on distributed organizing of online ensembles and discovery of “hidden” knowledge that drives boundary spanning tactics of collaborators. Practical implications – In cross-organizational collaborative settings, boundary spanning represents an enacted capability stemming from the intertwining between material and social/collective agencies. Consequently, boundaries surface as first class design constructs, directing design attention not only to features inscribed in technology (i.e. user profiles, registration mechanisms, moderation policies) but also the way such features are appropriated to re-shape, re-locate or dissolve boundaries. Originality/value – An empirical data pool compiled through virtual ethnographic assessment of online collaboration is revisited and augmented with knowledge visualization techniques that enhance the interpretive capacity of the data and reveal “hidden” aspects of the collaborators’ boundary spanning behaviour and tactics.


Sign in / Sign up

Export Citation Format

Share Document