scholarly journals An introduction to intuition theory and practice: a summary and a research agenda

Author(s):  
Marta Sinclair
2020 ◽  
Vol 14 (3) ◽  
pp. 90-96
Author(s):  
Thomas J. Yannuzzi ◽  
Deborah N. Smith ◽  
Michela Balconi ◽  
Kimberly R. Davis ◽  
Giulia Fronda ◽  
...  

2012 ◽  
Vol 06 (02) ◽  
pp. 243-259
Author(s):  
MOHAMMAD MOURHAF AL ASSWAD ◽  
AUHOOD ALFARIES ◽  
SERGIO DE CESARE ◽  
MARK LYCETT

Semantic web services (SWS) have recently attracted much attention because of their potential to automate all common service tasks such as discovery, composition, invocation and execution. The successful implementation of SWS is profoundly based on the availability of appropriate methods for SWS description. There is, however, no consensus in the SWS arena on the significant service elements that make SWS description comprehensive. Furthermore, semantic annotation of those elements is still a manual process where human involvement is a must. Therefore, automating the annotation process is highly desired as the manual annotation is a difficult, costly and time-consuming process. Few approaches exist aiming to semi-automate the annotation task. These approaches have limitations preventing their wide adoption by the research and practice communities. This paper contributes by analysing and comparing those existing semi-automatic Web service annotation approaches in order to highlight the major challenges and provide fruitful guidelines to aid future research. Particularly, a synthesis of service elements that require semantic annotation is provided and then used to assess the completeness of semi-automated approaches. The comparison leads to significant implications for theory and practice.


Oryx ◽  
2013 ◽  
Vol 47 (3) ◽  
pp. 369-380 ◽  
Author(s):  
Joseph W. Bull ◽  
K. Blake Suttle ◽  
Ascelin Gordon ◽  
Navinder J. Singh ◽  
E. J. Milner-Gulland

AbstractBiodiversity offsets are an increasingly popular yet controversial tool in conservation. Their popularity lies in their potential to meet the objectives of biodiversity conservation and of economic development in tandem; the controversy lies in the need to accept ecological losses in return for uncertain gains. The offsetting approach is being widely adopted, even though its methodologies and the overriding conceptual framework are still under development. This review of biodiversity offsetting evaluates implementation to date and synthesizes outstanding theoretical and practical problems. We begin by outlining the criteria that make biodiversity offsets unique and then explore the suite of conceptual challenges arising from these criteria and indicate potential design solutions. We find that biodiversity offset schemes have been inconsistent in meeting conservation objectives because of the challenge of ensuring full compliance and effective monitoring and because of conceptual flaws in the approach itself. Evidence to support this conclusion comes primarily from developed countries, although offsets are increasingly being implemented in the developing world. We are at a critical stage: biodiversity offsets risk becoming responses to immediate development and conservation needs without an overriding conceptual framework to provide guidance and evaluation criteria. We clarify the meaning of the term biodiversity offset and propose a framework that integrates the consideration of theoretical and practical challenges in the offset process. We also propose a research agenda for specific topics around metrics, baselines and uncertainty.


2012 ◽  
Vol 45 (2) ◽  
pp. 234-249
Author(s):  
Stephen Stoynoff

In a recent state-of-the-art (SoA) article (Stoynoff 2009), I reviewed some of the trends in language assessment research and considered them in light of validation activities associated with four widely used international measures of L2 English ability. This Thinking Allowed article presents an opportunity to revisit the four broad areas of L2 assessment research (conceptualizations of the L2 construct, validation theory and practice, the application of technology to language assessment, and the consequences of assessment) discussed in the previous SoA and to propose tasks I believe will promote further advances in L2 assessment. Of course, the research tasks I suggest represent a personal stance and readers are encouraged to consider additional perspectives, including those expressed by Bachman (2000), Chalhoub-Deville & Deville (2005), McNamara & Roever (2006), Shaw & Weir (2007), and Stansfield (2008). Moreover, readers will find useful descriptions of current research approaches to investigating L2 assessments in Lumley & Brown (2005), Weir (2005a), Chapelle, Enright & Jamieson (2008), Lazaraton (2008), and Xi (2008).


2008 ◽  
pp. 2402-2420
Author(s):  
Lixin Fu ◽  
Hamid Nemati ◽  
Fereidoon Sadri

Privacy-preserving data mining (PPDM) refers to data mining techniques developed to protect sensitive data while allowing useful information to be discovered from the data. In this article, we review PPDM and present a broad survey of related issues, techniques, measures, applications, and regulation guidelines. We observe that the rapid pace of change in information technologies available to sustain PPDM has created a gap between theory and practice. We posit that without a clear understanding of the practice, this gap will be widening which, ultimately, will be detrimental to the field. We conclude by proposing a comprehensive research agenda intended to bridge the gap relevant to practice and as a reference basis for the future related legislation activities.


Author(s):  
Corinne Bieder ◽  
Kenneth Pettersen Gould

Abstract This chapter discusses some of the research and management challenges related to the safety and security nexus. In the first part, we address the conceptual connections between safety and security and discuss how different perspectives on how they come together allows for characterizing the complexity and ambivalence of their interrelations. We then go on to identify tradeoffs between safety and security and show that these exist both in theory and practice. Managing both safety and security means tradeoffs and power relations between internal entities and professionals, but also beyond its own boundaries since some vulnerabilities escape the organization’s scope. In the final part of the chapter, we argue that addressing the interrelations between safety and security poses managerial and research challenges that call for global approaches to apprehend the multiple facets of the issue. We explain that little has been done on how the global trends of the risk society bring with them unanticipated and “hidden” effects on organizations safety and security practices and that it is here, as a macro-global oriented approach to organizational safety and security research, that the two fields of safety and security confront a shared research agenda.


Author(s):  
Lixin Fu ◽  
Hamid Nemati ◽  
Fereidoon Sadri

Privacy-Preserving Data Mining (PPDM) refers to data mining techniques developed to protect sensitive data while allowing useful information to be discovered from the data. In this chapter the review PPDM and present a broad survey of related issues, techniques, measures, applications, and regulation guidelines. The authors observe that the rapid pace of change in information technologies available to sustain PPDM has created a gap between theory and practice. They posit that without a clear understanding of the practice, this gap will be widening, which, ultimately will be detrimental to the field. They conclude by proposing a comprehensive research agenda intended to bridge the gap relevant to practice and as a reference basis for the future related legislation activities.


2021 ◽  
pp. 183933492199947
Author(s):  
Lucas Whittaker ◽  
Kate Letheren ◽  
Rory Mulcahy

Deepfakes, digital content created via machine learning, a form of artificial intelligence technology, are generating interest among marketers and the general population alike and are often portrayed as a “phantom menace” in the media. Despite relevance to marketing theory and practice, deepfakes—and the opportunities for benefit or deviance they provide—are little understood or discussed. This article introduces deepfakes to the marketing literature and proposes a typology, conceptual framework, and associated research agenda, underpinned by theorizing based on balanced centricity, to guide the future investigation of deepfakes in marketing scholarship. The article makes an argument for balance (i.e., situations where all stakeholders benefit), and it is hoped that this article may provide a foundation for future research and application of deepfakes as “a new hope” for marketing.


2021 ◽  
Vol 17 (1) ◽  
pp. 97-128
Author(s):  
Sunna Kovanen ◽  

Purpose: The aim of this article is, firstly, to explore and structure the emerging research on collaboration in social entrepreneurship, and secondly to tackle the identified gaps in the literature with a research agenda based on the communities and networks of practice theory. Methodology: The article relies on a systematic literature review, which summarizes the existing evidence base and critically evaluates major theoretical approaches. The analytical focus is on ambiguity and scales of collaboration. Findings: Three main research strands have been identified: first, community and public sector collaboration focusing on the participatory initiation of services by local communities; second, collaboration for resources and employment focusing on power relations between established organizations; and third, network- and micro-level collaboration focusing on collaborative governance of complex networks. A vaguely contextualized and non-critical approach to social entrepreneurship remains prominent; however, recent studies on community and network collaboration present nuanced approaches to scalarity and ambiguity. Implications for theory and practice: Existing research could benefit from explicit and broader theorization of collaboration, the analysis of ambiguous experiences and contexts and attending to the interplay between daily practices and larger-scale institutional change. The paper presents a compiled reference base and gives directions about future research and practice re-thinking social enterprise as a collaborative endeavor. Originality and value: The article contributes to social entrepreneurship studies by structuring the field and enhancing critical theory on the topic.


2011 ◽  
Vol 131 (2) ◽  
pp. 689-700 ◽  
Author(s):  
Mark Stevenson ◽  
Yuan Huang ◽  
Linda C. Hendry ◽  
Erik Soepenberg

Sign in / Sign up

Export Citation Format

Share Document