29 March 2013
New Editor for Luxury Intelligence
28 March 2013
Call for papers: "Service-centric Models, Platforms and Technologies"
service-centric-asset-management-and-why-should-you-care/
Suitable topics include but are not limited to:
- Service-centric investigations, approaches, strategies, developments
- Service-centric referencing methodologies and utilities
- Intra- and inter-enterprise for business-to-business collaborative services
- Service-centric network configurations and assets
- Expectations and faithfulness in services-centric models
- Cultural, social and legal issues in services-centric models
- Commercialisation of service-centric computing technologies
- Solutions and configurations for business services
- Case studies in services-centric scenarios
Special issue: "Services Innovation in Emerging Economies: Theory, Practice And Policy"
- Community participation of cultural heritage tourism from innovation system perspective
- Does one size fit all? The governance mode and strategic position of cluster innovation platforms
- An empirical study on the relationship between service innovation and firm performance based on revised SPC model: evidence from China's communication industry
- The front/back office configuration in new service development: case study of local commercial bank in China
- Tapping the innovation potential of knowledge intensive services in emerging economies
- Social innovation: the process development of knowledge-intensive companies
- Service innovation and competitive advantage with the perspective of system dynamics - using China Mobile as an example
Thematic issue: "Managing National Healthcare: Economics, Culture and Strategic Choice"
- Strategic choices in healthcare, with reference to the UK National Health Service
- Global health and the business of illness
- The challenge of healthcare accessibility in sub-Saharan Africa: the role of ideas and culture
- Chinese healthcare system and workers' welfare
- Internationalisation and firm performance: state of empirical research efforts and need for improved approaches
- Stakeholders' management approach in Italian 'territorial' companies Loccioni Group and the 'Land of Values - LOV' project
27 March 2013
Computer, read my lips
A computer that can lip-read would be a boon for those with speech difficulties as well as people in noisy environments where conventional voice recognition cannot be used. Now, a team at the University of Essex, in Colchester, UK, and colleagues at the Chongqing University of Posts and Telecommunications, in Chongqing, China, have developed an accurate system that can analyse and interpret lip shape.
Writing in the International Journal of Modelling, Identification and Control, University of Essex professor of computer science and electronic engineering, Huosheng Hu, and colleagues explain why conventional voice-activated human-machine interfaces are not available to many people, either because of personal disability or the environment in which such systems must be used.
The team explains that their system is based on a novel lip shape feature extraction method that uses the computer’s web camera to assimilate an image sequence of the user’s lips. A statistical method known as a hybrid dual-tree complex wavelet transform (DT-CWT) and discrete cosine transform (DCT) are then used to pin down the characteristics of the lip shapes at different points in time, which is then coupled to a trained database of shapes associated with specific words or commands.
The approach sidesteps the problem of head movement by pinning down invariant points on the images around the mouth. The team has tested the system with a wheelchair user and demonstrated that a small vocabulary of commands to control the wheelchair can be recognised in a noisy environment once the system is trained.
A computer system that could lip read might also be adapted for mobile devices such as smart phones adding an extra layer to applications that respond to voice commands in environments where the user must remain quiet if not silent, such as libraries, theatres and even monasteries.
“Hybrid lip shape feature extraction and recognition for human-machine interaction” in Int. J. Modelling, Identification and Control, 2013, 18, 191-198
Computer, read my lips is a post from: David Bradley's Science Spot
via Science Spot http://sciencespot.co.uk/computer-read-my-lips-2.html
Head in the clouds, feet on the ground
The first tentative steps towards a peer-to-peer approach to cloud computing that enables users and removes the risks and costs of relying on industry giants to offer services are being taken by an international team of researchers.
Cloud computing is gradually becoming more and more pervasive as accessibility to broadband internet connections and always-on mobile devices rise. As a system, cloud computing takes on to remote and often distributed computers – the cloud – the software applications and data files that would normally be held on one’s personal computer. Major players in the computing industry including, Microsoft, IBM and Oracle/Sun have finally weighed in on the cloud, while the Internet giants, including Google and Amazon, have been offering cloud services for email, web hosting, data storage, online office applications and much more for several years. The issue from the users’ point of view is that one might become entirely reliant on services that may not persist indefinitely or that may come at a rising cost.
Hajar Mousannif of Cadi Ayyad University, in Marrakech, Morocco working with Ismail Khalil and Gabriele Kotsis at Johannes Kepler University, Linz, Austria, explain that cloud computing relies on various services and systems. Software-as-a-Service (SaaS) is the online applications, such as web-based email among well-known examples are GoogleApps and Salesforce.com. There is then the Platform-as-a-Service (PaaS), which includes the likes of Microsoft Windows Azure and Amazon Web Services. PaaS allows users to deploy their own applications. Finally, there is Infrastructure-as-a-Service (IaaS), this offers access to processing power and/or storage space in the cloud and examples include Rackspace, Nimbus, and Eucalyptus.
“With cloud computing, users can access the services based on their requirements regardless of where the services are hosted or how they are delivered,” the team says. “Moreover, clients only pay for the quantity of the rented resources (data storage, computation, etc.) they consume.” But, they then ask, “Why even pay when you can simply cooperate to get the services you need?”
The collaborators are now introducing a new Peer-to-Peer (P2P) cloud architecture, which they call Cooperation as a Service (CaaS). The system, they say, provides participants with all the necessary infrastructure, platform and software services in the cloud by taking advantage of cooperation among different peers in the system rather than relying on corporate third-party systems.
The proposed CaaS cloud architecture enables computers to share information and other resources with peers on the network in large-scale distributed computing environments. The team explains that the principle relies on a “you scratch my back, I’ll scratch yours” approach of mutual assistance. This, they explain, fuels spontaneous participation among the peers, if they don’t assist each other, then their own services will not function. Several challenges remain, such as creating a large enough network to sustain a CaaS and to ensure security and privacy are maintained at the level required by each user.
“The cloud is not ‘there’, we are the cloud!” in Int. J. Web and Grid Services, 2013, 9, 1-17
Head in the clouds, feet on the ground is a post from: David Bradley's Science Spot
via Science Spot http://sciencespot.co.uk/head-in-the-clouds-feet-on-the-ground.html
26 March 2013
Int. J. of Energy Technology and Policy to publish expanded papers from the 4th Int. Conf. on Advances in Energy Research
Call for papers: "Technology Transfer for Sustainable Regional Economic Development: A System Innovation Perspective"
- Innovation and regional sustainability or regeneration
- Practices and tools for technology transfer
- System innovation for regional development
- Regional innovation systems
- Societal challenges for research
- Entrepreneurial learning and regional development
- The entrepreneurial university
- Innovation-driven science-industry partnerships
- Training initiatives for innovation stimulation
- Regional clusters and local and international innovation networks
- Social business and social innovation
- Regional innovation policy and evaluation
- Case studies or review papers on relevant regional innovation topics
Women make better company directors than men
Female directors scored significantly higher than their male counterparts in standard tests to determine a person’s reasoning methods in terms of personal interest (let’s make a deal), normative (don’t rock the boat) and complex moral reasoning, according to research to be published in the International Journal of Business Governance and Ethics.
Chris Bart of the DeGroote School of Business at McMaster University, in Ontario Canada and colleagues explain that the better performance in these CMR tests of women compared with men (624 candidates were tested) provides an explanation for why earlier research has repeatedly seen a positive correlation between the presence of female directors on company boards and corporate performance. The researchers point out that such evidence should underpin a shift to more gender equitable boards of directors.
Most geographic population groups are 50% female, but women remain under-represented in the boardroom. As Bart points out, it is amazing that the typical excuses proffered for this anomaly, including “there are not enough talented/educated/experienced females to fill the positions” no longer pass muster within North America and Europe. Indeed, women now represent more than 50% of the graduates of the professional programs of most universities so there is no shortage of female talent in the pool of young women ready to climb the corporate ladder. Nevertheless, with women widely represented at less than 10% of board membership they are inevitably “crowded out” by male members of those boards.
“CMR involves acknowledging and considering the rights of others in the pursuit of fairness by using a social cooperation and consensus building approach that is consistently applied in a non arbitrary fashion,” the team explains. “The dramatic importance of this is highlighted when one considers that the role of directors is solely to make decisions or, more precisely, to help the board make decisions.” They add that, “Since all decisions have multifaceted social impact implications affecting one or more individuals or stakeholder groups CMR is a tremendous skill to possess, but particularly at the board level.”
“Why women make better directors” in Int. J. Business Governance and Ethics, 2013, 8, 93-99
Women make better company directors than men is a post from: David Bradley's Science Spot
via Science Spot http://feedproxy.google.com/~r/Science-Spot-News/~3/j9Obxiv2Vzw/women-make-better-company-directors-than-men.html
25 March 2013
Call for papers: "Intelligent Informatics"
- Intelligent agents
- Intelligent agents for web services and/or intelligent web applications
- Intelligent robotic agents, mobile agents, information agents, learning agents
- Intelligent health monitoring systems
- Intelligent decision support systems
- Multi agent systems
- Distributed intelligent systems
- Intelligent systems modelling
- Machine learning algorithms
- Expert systems, rule-based systems, ontology-based systems
- Intelligent social networks or social informatics
- Knowledge management with augmented reality
- Neural networks, ANFIS
- Fuzzy knowledge systems, fuzzy inference systems, fuzzy reasoning
- Knowledge discovery and data mining
- Knowledge-based systems
- Knowledge representation, ontology, ontology integration
- Scalable data discovery, access, query and search
- Bioinformatics
- Technologies and agents
- Applications of intelligent informatics in various engineering disciplines
Call for papers: "Information and Communication Technologies Research and Applications in South East Europe"
- Algorithms and data structures
- Artificial intelligence
- Bioinformatics
- Business intelligence
- Communication and information Systems security
- Computational science
- Computer and communication networks
- CRM and ERP systems
- Cultural and museum information Systems
- Databases
- Data mining
- Digital libraries
- eCommerce, eBusiness, eGovernment, eHealth
- Education technologies
- Graphics, visualization
- Multimedia and virtual reality
- Grid, cluster and P2P computing
- Hardware and architecture
- Human-computer interaction
- Image and video processing
- Information retrieval
- Information society: legal and regulatory issues
- Information systems
- Information theory
- Knowledge-based systems
- Numerical and scientific computation
- Open source software
- Operating systems
- Parallel and distributed systems
- Privacy-enhancing technologies
- Programming languages
- Sensor networks
- Signal processing
- Software engineering
- Telecommunication systems and policies
- Wearable computing
- Wireless and mobile computing
- Green ICT and supply chains
- Collaborative and intelligent systems of innovation, virtual innovation environments
- e-technology adoption and semantic web services
- Smart cities
24 March 2013
Special issue: "Advances in Machining Processes"
- Analysis on the characteristics of Nd:YAG laser marking on alumina ceramic based on RSM
- Investigation of the surface integrity induced by abrasive flow machining on AISI D2 hardened steel
- Chip formation studies in machining fibre reinforced polymer composites
- Investigation of chatter stability in boring tool and tool wear prediction using neural network
- Development of a thermocouple sensor using tool coating and its substrate to measure metal turning temperatures
- Analysis of two- and three-body abrasive wear during machining of aluminium-based metal matrix composite
23 March 2013
Special issue: "Advances in Robotics and Mechatronics"
- Dynamic step traverse of a two-wheeled mobile robot
- Genetic algorithms with variable search space function for fine gain tuning of model-based robotic servo controller
- A forming algorithm and its position estimation for triangle-based robot formation
- Multiple mobile robots system with network-based subsumption architecture
- Design and testing of a high frequency air-cored resonance transformer
- Formation control of multiple mobile robots utilising synchronisation approach
First issue: International Journal of Human Rights and Constitutional Studies (free sample issue available)
There is a free download of the papers from this first issue.
22 March 2013
Special issue: "Innovations in Islamic Marketing and Business"
Includes expanded versions of papers from the 2nd Global Islamic Marketing Conference.
- Marketing mix through the integration of new and traditional media: a review of recent literature
- Exploring future markets for Pakistani halal meat export
- The relationship between consumers' religiosity and risk perceptions surrounding the use of SNS
- How generation Y is energising the 'Muslim' brand through novelty t-shirts
- Gauging attitudes towards the environment through NEP: a case study from India
- Fashion effects on customer satisfaction: an analysis of the Pakistani shoe industry
- The feasibility of establishing Islamic banks in the UK: the case of Nottingham
- Islamic finance and its role in SME development case in point: Egypt
- A study of Islamic customer satisfaction
Inderscience journals to publish expanded papers for the IACCM Europe Forum 2013
Call for papers: "Building Theory from Case Research and Case Methodologies in Cross-Cultural Contexts"
Interest in using case studies and case research for theory development has exploded in recent years as is evident from the growth of special journal issues, books and professional development workshops around the world. This interest builds on long-established traditions within management science and international business for theory development based on in-depth case research methods.
Seminal works, among others, include the Growth of a Firm (Penrose,1960), Structure follows Strategy (Chandler, 1962), Politics of Organizational Decision-Making (Pettigrew, 1973), Dimensions of National Cultural Differences (Hofstede, 1980), Corporate Venturing within Multidivisionals (Burgelman,1983), Transnational Solutions (Bartlett & Ghoshal,1989), and Core Competencies (Prahalad & Hamel,1990). This rich tradition was further legitimised by recent scholars such as Yin (1984), Eisenhardt (1989) and Piekkari and Welsh (2011).
Efforts to generalise theoretical contributions beyond a particular cultural context have often resorted to the use of traditional quantitative statistical research methods. Such research has increased our understanding of key dimensions of culture, and of the ways in which cultures vary. However, quantitative research has typically been unable to explain the roots of cultural differences (“why” do they exist) or the best ways in which to handle them (“how” to operate effectively).
As such, fine grained research in the form of the case-based method is particularly suited to address such questions as its purpose is to “generate theory and/or contribute to extant theory” (Mills et al., 2010: xxxii). In spite of the long-standing debate on research methods, there is a lack of understanding of how case research can be used for building theory. In order to fill this gap, case scholars from North America and Europe have come together to co-edit this special issue.
We are particularly interested in conceptual and cross-cultural case-based research that makes a strong contribution to existing theory or establishes new theoretical foundations. Thus, we welcome papers and research cases that make strong contributions to theory development and/or deal with methodological issues embedded in this research process. We welcome junior and senior scholars engaged in such research to submit to this issue. Note that the issue will not include teaching cases or papers addressing research issues related to the development of teaching cases.
Submissions must include a strong methodology section with a detailed description of data sources and methodologies used in the research. Submissions which do not include a thorough methodology section will automatically be rejected.
Suitable topics include but are not limited to the following:
- Contributions may address cross-cultural phenomena. General contributions with theory development based on case methods and case study are also welcome.
- Contributions may address a balance between case description and theory development. The particular balance depends on the research project reported in the contribution. (Submissions with only methods, case description, or mere theory development will automatically be rejected)
- The causal argument should be apparent and should show the theoretical logic of the causal relationship between variables.
- Pluralistic approaches to theory building are welcome.
- Transparency of the case research procedure is a must. Contributions must address to what extent the same findings can be replicated by other researchers using the same procedure. Authors are, for example, encouraged to be reflective in their approach and analyse their own experiences.
- Contributions must also address to what extent the results are valid beyond the specific context within which the case study has been conducted, i.e. to what extend the findings can be generalised to other settings (Eisenhardt, 1989). Multiple paradigms for theorising are welcome.
- Contributions that use qualitative and/or quantitative methods as well as mixed- methods case studies are welcome, as are case studies with multiple data sources.
Submission deadline: 15 October, 2013 (extended)
Decisions to authors: 31 December, 2013
First issue: International Journal of Applied Nonlinear Science (free sample issue available)
There is a free download of the papers from this first issue.
21 March 2013
International Journal of Oil, Gas and Coal Technology to increase issue frequency
Inderscience is media partner for the 16th Warwick International Postgraduate Conference
The journal involved is the European Journal of Cross-Cultural Competence and Management.
Inderscience is media partner for the 2nd Annual Oil & Gas Security 2013 Summit
The journals involved are:
- International Journal of Critical Infrastructures
- International Journal of Emergency Management
- International Journal of Risk Assessment and Management
Int. J. of Banking, Accounting and Finance to publish expanded papers from the 2013 International Risk Management Conference
20 March 2013
Learning ethical lessons from Avatar
You’d all know which movie I was referring to if I mentioned lanky blue aliens flying about on a mining planet with humans chasing after the mythical element unobtanium, right? Well, it’s James Cameron’s 2009 release Avatar, just in case you didn’t get it.
Norm Borin of California Polytechnic State University and Arline Savage of the School of Business at the University of Alabama at Birmingham, argue that the fictitious mining company in the movie, RDA, makes a perfect case study for how not to be a sustainable company and offers lesson to more down to earth corporations hoping to gain green credentials as opposed to the blues. We hear a lot about indigenous peoples (the Na’vi in the movie) whose health and lives are all but destroyed by invading corporations such as Resources Development Administration (RDA) in the movie. The researchers draw a parallel between the problems faced by the Na’vi and the pollution and deforestation, facing people from Alberta to Ecuador, from Kenya to the Philippines and beyond.
Fundamentally, the fictional plot hinges on RDA seeking to procure a valuable resource for profit while ignoring and violating the social and cultural needs and desires of those who live where the resource is located and at the same time destroying many of the unique environmental characteristics of their environment. The researchers suggest that it is unlikely that James Cameron developed the movie with the objective that it would be used as a case example for business sustainability, but it is likely that he was well aware that Avatar represents an allegory for the malignancy of corporate greed and certainly has some valuable lessons for corporations, the team says.
The team provides some useful approaches to show how a company might improve its corporate responsibility as it ventures into new areas of the planet. These include a consideration of prioritizing the three p’s in this order – (1) planet, (2) people, (3) profits. They also suggest expanding stakeholder groups to include at the base of the pyramid the inhabitants and hiring managers with knowledge and an interest in ethics and environmental resource allocation. Finally, they believe that building accountability feedback systems from the company board to the indigenous groups is important for sustainability.
“There have been repeated examples of successful sustainable ventures by companies,” the team concludes, “but they require implementation of these ideas to avoid failure on the Avatar scale.” Borin adds that, “We believe it does cover an important topic that impacts any business dealing with indigenous populations.”
Borin N. & Savage A. (2012). The sustainable corporation: lessons from Avatar, International Journal of Sustainable Strategic Management, 3 (4) 294. DOI: 10.1504/IJSSM.2012.052653
Learning ethical lessons from Avatar is a post from: David Bradley's Science Spot
via Science Spot http://feedproxy.google.com/~r/Science-Spot-News/~3/UF4weCOYzJs/learning-ethical-lessons-from-avatar.html
Call for papers: "Using Social Media for Collaborative Learning"
- Using social media platforms (such as Facebook Group, Google Group, Yahoo Group, Edmodo, Wiki, Weblog) to support group collaboration
- Using social media to effectively coordinate group members' collaborative efforts
- Using social media to promote group members' positive interdependence
- Using social media to monitor group members' individual contributions
- Using social media to support peer evaluation
- Using social media to facilitate the assessment of students' contributions and learning outcomes
- Case studies of using specific social media platforms to support group collaboration
- Strategies and challenges of using social media to support collaborative learning
- Design and evaluation of social media apps for collaborative learning
- Assessment of collaborative learning
New Editor for International Journal Radio Frequency Identification Technology and Applications
19 March 2013
Special issue: "Advanced Approach on Information Retrieval: Foundations and Applications"
Expanded versions of papers presented at KES/IIMSS2012.
- Approximate search algorithm for aggregate k-nearest neighbour queries on remote spatial databases
- A new spatio-temporal prediction approach based on aggregate queries
- Encoding network-constrained travel trajectories using routing algorithms
- A preventing method for overlapping focuses in a Focus+Glue+Context Map
- Optimal study number of stochastic e-learning system
- Multiple-choice cloze exercise generation through English grammar learning support
- A method for generating presentation slides based on expression styles using document structure
Call for papers: "Risk Culture and Crisis Communication"
- Concepts of risk culture
- Impact of socio-cultural factors on risk perception
- National specificities and risk cultures
- Taking into account risk perception for risk and crisis management
- Influence of public trust in authority on crisis communication
- Case studies and lessons learned from previous disasters
- Role of press, mass media and social media for crisis communication
- The interrelationship between risk culture and compliance in cases of disaster
- Disaster knowledge and coping strategies
- Best practice in reaching the public via crisis communication
- Social learning of crisis and institutional responses
- Cultural patterns and crisis responses
Special issue: "Variable Structure Systems in Automotive Applications"
- Application of variable-structure output feedback control to active front steering for understeer and oversteer conditions
- A sliding mode controlled three wheeled narrow vehicle
- Second order sliding modes control for rope winch based automotive driver robot
- Robust control of electronic wedge brake with adaptive pad friction estimation
- Robust nested sliding mode integral control for anti-lock brake system
- Improvements in vehicle handling and stability by a novel wheel slip coordination control scheme
- Wheel slip control of road vehicles via switched second order sliding modes
- Sliding-mode-based disturbance observer approaches for vehicle steering control
- Heavy duty vehicle tyre forces estimation using variable gain sliding mode observer
- Nonlinear sliding mode control of switched systems on continuously variable transmission shifting
- Condition monitoring of gasoline engine air intake system using second order sliding modes
- A new traction control system for the vehicle with automatic transmission
Special issue: "Industrial Tools and Materials Processing Technology"
Expanded versions of papers from the 8th International Conference on Tools and Material Processing Technologies (ICIT&MPT 2011).
- Multilayer laser-assisted deposition on single crystal superalloy substrates
- Influence of laser deposition technique on surface integrity of 12 Ni maraging tool steel
- Effect of laser surface alloying on structure of a commercial tool steel
- Laser Shock Processing: an emerging technique for the enhancement of surface properties and fatigue life of high-strength metal alloys
- Dislocation configuration evolution of FCC alloys induced by Laser Shock Processing
- Recent developments in laser machining of tools
- Powder injection moulding: processing of small parts of complex shape
- Mathematical modelling and computer simulation of mechanical properties of quenched and tempered steel
- New frontiers for thixoforming
- Recent development trends in sheet metal forming
18 March 2013
New Editor for the Int. Journal of Vehicle Information and Communications Systems
Special issue: "Opening Up Innovation and Business Development Activities"
Expanded versions of papers from the 2011 Continuous Innovation Network Conference.
- Sources of innovation, their combinations and strengths - benefits at the NPD project level
- Exploiting supplier innovativeness through knowledge integration
- Knowledge related activities in open innovation: managers' characteristics and practices
- User toolkits for innovation - a literature review
- Exploring the incorporation of users in an innovating business unit
- Value creation and appropriation in social media - the case of fashion bloggers in Sweden
- Openness in innovation and business models: lessons from the newspaper industry
Int. J. of Environmental Technology and Management to publish expanded papers from CSEI2013
Special issue: "System of Systems Engineering – Past Emerging to Evolving?"
- Systems theory: a formal construct for understanding systems
- Stakeholders in systems problems
- Errors in systems approaches
- Prevalence of pathologies in systems of systems
- Why optimisation of a system of systems is both unattainable and unnecessary
- Measuring system of systems performance
- Systems of systems engineering education
- Defining SoS requirements: an early glimpse at a methodology
- Securability for system of systems
- Data governance for SoS
- System of systems information assurance policy: a call for reform
- Integrated condition assessment for Navy system of systems
- Characteristics and emergent attributes of system-of-systems' simulations
Special issue: "Sport Participation Management and Marketing"
- The recreational sport participation scale: development, testing and practical application
- Determinants of middle school sport participation: a comparison of different models for school sport delivery
- The intersection of pop culture and non-traditional sports: an examination of the niche market of quidditch
- Strategies to increase sport participation in Canada: the role of a coordinated network
- Understanding senior sport participants' choice of regional senior games using a preference map
- Social capital within sport participation systems: a multi-national inquiry
- Post-event behavioural intentions of participants in a women-only mass participation sporting event
- An examination of how constraints and processes of change affect stages of behavioural change for recreational sport participation
15 March 2013
Inderscience journals to publish expanded papers from Int. Conference on Nanoelectronics, Communications and Renewable Energy
14 March 2013
Where’s the harm in sexting?
Sexting: Involves sending sexually explicit messages and/or photographs, primarily between mobile phones using the SMS system was first reported in 2005. It is an obvious portmanteau of “sex” and “texting”; the word was added to the Merriam-Webster’s Collegiate Dictionary in August 2012. 4% of mobile phone-owning teens claim to have sent sexually suggestive, nude or nearly nude images or videos of themselves to someone else via a mobile device while 15% claim to have received such material from someone they know.
With contract cell phones and cheaper multimedia messaging services it is easier and cheaper than ever to share information, images and other data. Ran Wei of the School of Journalism and Mass Communications at the University of South Carolina and Ven-Hwei Lo of the School of Journalism and Communication of the Chinese University of Hong Kong, examined the effects of teen sexting that involves serious privacy and personal safety issues. One observer has suggested that the desire for risk-taking and sexual exploration among teens, coupled with a perpetual connection with peers via mobile telephony, creates a “perfect storm for sexting.”
The USC-Hong Kong team has now carried out a survey of 236 adolescents in the USA, the results of which reveal that teenagers believe sexting to cause more harm to other people than to themselves. Moreover, they also consider that sext” messages subsequently posted to the Internet on social networking sites and elsewhere are more harmful than those messages that are shared en masse among a group of phone users. However, they also felt that consensual sexting between two people was less harmful.
The survey also revealed a strong gender gap with regards to third-person perception of sexting: both males and females believed other females were more harmed by sexting. This perception of girls, not boys, as the victims of sexting is perhaps a common theme in sexual culture and predates telecommunications by several centuries if not longer I’d say. The survey did reveal that this gender gap meant many respondents were willing to support restrictions on sexting, but those who participated in this activity were less keen on the application of restrictions.
“Sexting raises a new issue with far-reaching social consequences for teenagers because it spans the boundaries of interpersonal communication and mass mediated communication,” the team explains. “In addition, sexting poses a challenge in defining the boundary between what is socially appropriate and what is inappropriate in various communication contexts.” They point out that fun or flirtatious messages between two teenagers in a romantic relationship might be shared outside that relationship to a large audience on wireless networks or the internet, causing psychological, social, cultural, and legal problems. Indeed, there have been numerous legal cases involving high-school students who have sexted in recent years.
“Sexting among teens is characteristic of an expected negative message from the perspective of parents, educators, and law enforcers,” the team concludes. “When sexting is no longer confined to two people in a romantic relationship, to be vulnerable to sexting implies that sext messages may end up in the hands of predators and have a long-term harm on a teen sexter’s future.”
“Examining sexting’s effect among adolescent mobile phone users” in Int. J. Mobile Communications, 2013, 11, 176-193
Where’s the harm in sexting? is a post from: David Bradley's Science Spot
via Science Spot http://feedproxy.google.com/~r/Science-Spot-News/~3/05_Q6bJKois/wheres-the-harm-in-sexting.html
Special issue: "Cross-Cultural Transformations and Conflict in the Current Global Arena"
- Narratives, paradigms and change - the issue of relevance
- Perception of luxury: idiosyncratic Russian consumer culture and identity
- Differences in attitudes towards corporate social responsibility between Lithuanian and Swedish consumers
- Culture-performance relationships in mergers and acquisition: the role of trust
- The role of cultural learning and collective teaching initiatives in M&A knowledge transfer
- On the counterintuitive consequences of high-performance work practices in cross-border post-merger human integration
- When and how previous experience affects the stock market reaction to business combinations
13 March 2013
Call for papers: “Informal Economy Entrepreneurship in Sub-Saharan Africa"
- Nature of the informal economy in sub-Saharan Africa:How can we define entrepreneurship in the informal economy in sub-Saharan Africa? How does this informal economy work and where is it after all? Is the informal economy in rural or urban areas? What are the perceptions of entrepreneurship and entrepreneurs in sub-Saharan Africa? What are the dimensions of the informal economy? To what extent can the construct of portfolio informal entrepreneurship, in which individuals engaged in several informal activities to complement their regular monthly or annual income, be considered as a particular form of informal entrepreneurship? How does the informal economy function in different regions of sub-Saharan Africa? What are the effects of past colonisation history on the informal economy? What is the contribution of the informal economy to the larger economy? How do people build assets in the informal economy?
- Interface between informal economy and formal economy in sub-Saharan Africa:At what point does an informal economy 'firm' decide to formalise? How is it possible to promote the formalisation of informal firms? How can we explore the links between government institutions and the informal economy? Should governments try to formalise the informal economy? Should governments encourage the informal economy to the extent that it benefits society? How can local institutions of education engage the informal sector? What are the institutional underpinnings of the informal economy? What is the degree of permeability between the informal economy and the formal economy?
- Informal economy and the individual informal entrepreneur in sub-Saharan Africa:What is the nature of the informal authority of women in the informal economy in sub-Saharan Africa? For example, we know that women play an important role in the informal economy, e.g. they are involved in local cooperatives in the agricultural sector. What is the role of culture in the informal economy? What soft as well as technical skills are needed in the informal economy? What is the role of innovation in the informal economy and what innovative skills are necessary for success in the informal economy? Can we develop normative models for the informal economy? Do informal economy entrepreneurs understand the concepts of productive capacity and competitive advantage? How does the Chinese presence influence the informal economy in sub-Saharan Africa? What type of training is needed for entrepreneurs in the informal economy? How does the informal economy deal with formal institutions? What is the role of regional or tribal chiefs in the informal economy? How are local lending practices used in the informal economy? Does participation in the informal economy shape the personal identity of individual informal entrepreneurs?
- The informal economy's contribution to knowledge in entrepreneurship:We are seeking papers that could demonstrate how knowledge of the informal sector in sub-Saharan Africa contributes to theory development and practice in the field of entrepreneurship. We are particularly interested in papers that address the following questions: what business models are developed and implemented in the informal economy? What can we learn from the informal economy? What about the sub-Saharan African context has theoretical implications for understanding informal entrepreneurship? How can the African context influence our understanding of extant theories of entrepreneurship and management? For example, how does the informal economy inform organisation theories such as transaction cost theory, institutional theory and institutional entrepreneurship theory, to name but a few?
Call for papers: "Knowledge Acquisition, Reuse and Evaluation"
- Tools and techniques for knowledge acquisition, knowledge updating and knowledge validation
- Semantic web inference methodologies
- Semantic knowledge portals
- Web-based approaches for knowledge management
- Agent-based approaches for knowledge management
- Software agents for semantic web
- Semantic web-based knowledge management
- Tools, languages and techniques for semantic annotation
- Semantic searching
- Semantic brokering
- CSCW and cooperative approaches for knowledge management 2
- Evaluation of knowledge acquisition techniques
- Information and knowledge structures
- Languages and frameworks for knowledge and knowledge modelling
- Ontology creation, evolution, reconciliation and mediation
- Ontology-based approaches for knowledge management
- Knowledge delivery methods
- Knowledge life cycle
- Knowledge and information extraction and discovery techniques
- Knowledge extraction from images/pictures
- Intelligent knowledge-based systems
- Decision support and expert systems
Special issue: "Sustainability and Business Research"
- Industrial sustainability: challenges, perspectives, actions
- Determinants of green supply chain implementation in the food and beverage sector
- Corporate social responsibility in Latin America's petroleum industry: a national oil company's strategy for sustainable development
- Sustainability in the power plant choice
- Technology roadmap development process (TRDP) in the medical electronic device industry
- Creating enjoyable experiences: parents' perspectives on venue and programming successes and failures
12 March 2013
Searching the cloud for news
Arockia Anand Raj and Mala of the Anna University in Chennai, explain how many users are now overwhelmed by news sources despite the best efforts of current aggregators to file and filter stories based on user interests and even in the wake of Reddit, Twitter and other crowd and citizen journalism efforts. Technically, their new system CloudPress 2.0 exploits the MapReduce paradigm MapReduce is a programming model that allows large data sets to be processed using distributed computing on clusters of computers, something for which Google is renowned. It also uses Lucene-based indexing. Apache Lucene is a free/open source information retrieval software library, which can be used for any full-text indexing applications and has been most widely used by Internet search engines and local, single-site searching applications.
The overall system architecture combines two processes : news dataset generation and news retrieval and visualization, the team explains. “News dataset generation involves fetching, processing, indexing, topic modelling and summarising news articles,” they explains. “News retrieval and visualisation involves query processing, on-the-fly summarising, ranking and retrieving of news from the distributed database and finally, visualising it as 3D visual.”
The team has pitted their system against the Ubicrawler and Mercator news aggregator systems and found that CloudPress 2.0 takes approximately half the time as those two to process news inputs where each URL might contain 100 or more links so there are several hundred URLs to be processed. Indeed, with 500 URLs, CloudPress processes them all in about 30 seconds, whereas Mercator and Ubicrawler take almost a minute to do the same processing. Pre-processing and Lucene indexing more than half the time taken to search an unindexed test database and cut the search times by 30 or 40% compared with a conventionally indexed database.
The next step will be to extend CloudPress 2.0 to the retrieval of news in the form of videos and audio and the development of ways to abstract a summary from those sources too.
“Cloudpress 2.0: a new-age news retrieval system on the cloud” in Int. J. Information and Communication Technology, 2013, 5, 150-166
Searching the cloud for news is a post from: David Bradley's Science Spot
via Science Spot http://feedproxy.google.com/~r/Science-Spot-News/~3/76LHl3ApGdE/searching-the-cloud-for-news.html
Hiding secret messages is a joke
Encrypting a message with a strong code is the only safe way to keep your communications secret, but it will be obvious to anyone seeing such a message that the sender is hiding something, regardless of whether they are encrypting their emails for legitimate or illicit purposes. Steganography on the other hand can hide a secret message in plain sight. Often a message is secreted within the binary strings of 0s and 1s in a compressed image or music file format. Prying eyes see only the original image or hear the song, whereas the recipient, knowing that a message is within uses software to extract it. Nevertheless, a putative interception might still take place; this kind of disguise also has the problem of requiring large file sizes.
An alternative to such steganography would be to hide a message in plain sight within a plain text document. Unfortunately, despite the much smaller file sizes that would be possible, secreting a message within normal text usually disrupts the grammar and syntax or the spelling and so immediately looks suspicious. Now, an alternative that is far less obvious and is tolerant of poor grammar has been developed by computer scientist Abdelrahman Desoky of the University of Maryland in Baltimore County, USA and is described in the latest issue of the International Journal of Security and Networks.
Desoky suggests that instead of using a humdrum text document and modifying it in a codified way to embed a secret message, correspondents could use a joke to hide their true meaning. As such, he has developed an Automatic Joke Generation Based Steganography Methodology (Jokestega) that takes advantage of recent software that can automatically write pun-type jokes using large dictionary databases. Among the automatic joke generators available are: The MIT Project, Chuck Norris Joke Generator, Jokes2000, The Joke Generator dot Com and the Online Joke Generator System (pickuplinegen).
A simple example might be to hide the code word “shaking” in the following auto-joke. The original question and answer joke is “Where do milk shakes come from?” and the correct answer would be “From nervous cows”. So far, so funny. But, the system can substitute the word “shaking” for “nervous” and still retain the humor so that the answer becomes “From shaking cows”. It loses some of its wit, but still makes sense and we are not all Bob Hopes, after all.
Other examples where substitutions are possible might include the equally funny: What do you get when you cross a car with a sandwich? A traffic jam, which might use a well-known sandwich bar brand, “Subway” as an alternative answer. Similarly, Where is Dracula’s American office? The answer being the Vampire State Building. The question could be substituted as Where is Dracula’s American home? With the same answer. There are endless puns any one of which might be used in a similar setting. A collection of such jokes sent in a message with the non-obvious answer substituted for the wittier version could conceal a message using Jokestega. Desoky suggests that 8 bits of data might be hidden in a simple joke of the type discussed.
Desoky A. (2012). Jokestega: automatic joke generation-based steganography methodology, International Journal of Security and Networks, 7 (3) 148. DOI: 10.1504/IJSN.2012.052529
Hiding secret messages is a joke is a post from: David Bradley's Science Spot
via Science Spot http://feedproxy.google.com/~r/Science-Spot-News/~3/8cH91DjSBeo/hiding-secret-messages-is-a-joke.html
Int. J. of Learning and Intellectual Capital to publish expanded papers from ICICKM 2013
Special issue: "User-Centred Health Informatics"
- A decision support system for technological planning and management of field hospitals
- Monitoring and measuring physical activity and sedentary behaviour
- Practice-centred work analysis: towards ontology-based decision support in cross-boundary e-health
- How can user-centred design affect the acceptance and adoption of service oriented healthcare information systems?
- Information technologies: opportunities and challenges in personal healthcare systems
- The demise of Google Health and the future of personal health records
- Strategic challenges facing user- and patient-centred e-health in Vietnam
11 March 2013
First issue: International Journal of Trust Management in Computing and Communications (free sample issue available)
There is a free download of the papers from this first issue.
9 March 2013
Call for papers: "Financial Risk Management in China"
- Evolution of Chinese risk management system (regulations, practices and strategies)
- Risk management in the banking sector (national and regional/local banks)
- Credit creation and regulations
- Development of financial instruments and risk management
- Balance/inbalance in credit allocation between state-owned sector and private sector
- Chinese risk management thought and its impact/relevance to today's risk management practices
- Financial risk management in municipal and rural China
- Financial risk management and the real estate market of China
- Financial risk management practices in China versus in western countries
- Financial risk management professional development
7 March 2013
Oranges and lemons
A computer recognition system that is 99% accurate can identify different fruits and vegetables, even the particular strain of apples or plums, for instance. Research to be published in the International Journal of Applied Pattern Recognition in March explains how challenging this issue has been until now and shows how it could be used in agricultural science and perhaps to improve efficiency in the growing and food industries as well as at the supermarket.
Shiv Ram Dubey and Anand Singh Jalal of GLA University in Mathura, India, have developed an automated image processing system that not only quickly distinguishes between oranges and lemons but can spot different strains of pear, melon, apple and plum. Such a system, given its high accuracy, could be used for sorting and packing different fruits and vegetables. However, it could also be used to speed up supermarket customer checkout where similar but different strains are on sale at different prices, without the need to barcode or otherwise label individual products.
The program developed by the team is trained with a set of images of known fruit and vegetables so that the image analysis software can assign common features to a database. The process involves photographing an image of the different fruits, “removing” the background and then analyzing the image left. They have thus trained their program with 15 different fruits and vegetables including various types of apple, onions, potatoes, oranges, limes, kiwi fruit, and different melons. Tests showed that 99 times out of 100 the software could correctly identify the product in question regardless of whether there were one or more items in the photograph and regardless of differences in lighting.
The team hopes to next extend the system to detect the signs of disease, bruising or other damage, which would allow products of unsalable quality to be removed before they reach the checkout.
“Species and variety detection of fruits and vegetables from images” in Int. J. Applied Pattern Recognition, 2013, 1, 108-126
Oranges and lemons is a post from: David Bradley's Science Spot
via Science Spot http://feedproxy.google.com/~r/Science-Spot-News/~3/EU7UUSKojt4/oranges-and-lemons.html
Special issue: "Trends in Computational Intelligence"
- Neuro-fuzzy integrated system with its different domain applications
- Supervised and semi-supervised learning in text classification using enhanced KNN algorithm: a comparative study of supervised and semi-supervised classification in text categorisation
- An intelligent routing approach using genetic algorithms for quality graded network
- Particle swarm optimisation with differential mutation
- gNIDS: rule-based network intrusion detection system using genetic algorithms
- Particle swarm optimisation for power quality improvement of a 12-pulse rectifier-chopper fed LCI-synchronous motor drive
- Development of an eye-tracking control system using AForge.NET framework
Special issue: "Innovation for Regeneration"
- A framework for innovation in a global NGO: building financial, institutional and programmatic sustainability
- Innovation in sustainable-new and emerging-technological fields: a patent-based perspective for Greece
- The transformation of pulp and paper industries: the role of local networks and institutions
- Different stages of the positioning of participative innovation (PI) over time. The case of the PI routine at the French National Railway Company (SNCF)
- Analysis of regional development and externally funded research projects in higher education: a continuum of multiple case study analysis
- Formalisation of front end innovation in supply network collaboration
- Strategy for social enterprises or never say never
6 March 2013
Inderscience is media partner for Health 2.0: Digital Technology in Clinical Care
The journals involved are:
Oranges and lemons – spot the difference
Ripe fruit image via Shutterstock
Shiv Ram Dubey and Anand Singh Jalal of GLA University in Mathura, India, have developed an automated image processing system that not only quickly distinguishes between oranges and lemons but can spot different strains of pear, melon, apple and plum. Such a system, given its high accuracy, could be used for sorting and packing different fruits and vegetables. However, it could also be used to speed up supermarket customer checkout where similar but different strains are on sale at different prices, without the need to barcode or otherwise label individual products.
The program developed by the team is trained with a set of images of known fruit and vegetables so that the image analysis software can assign common features to a database. The process involves photographing an image of the different fruits, “removing” the background and then analyzing the image left. They have thus trained their program with 15 different fruits and vegetables including various types of apple, onions, potatoes, oranges, limes, kiwi fruit, and different melons. Tests showed that 99 times out of 100 the software could correctly identify the product in question regardless of whether there were one or more items in the photograph and regardless of differences in lighting.
The team hopes to next extend the system to detect the signs of disease, bruising or other damage, which would allow products of unsalable quality to be removed before they reach the checkout.
“Species and variety detection of fruits and vegetables from images” in Int. J. Applied Pattern Recognition, 2013, 1, 108-126
Oranges and lemons – spot the difference is a post from: David Bradley's Science Spot
via Science Spot http://feedproxy.google.com/~r/Science-Spot-News/~3/6XXYHqIu7VM/oranges-and-lemons-spot-the-difference.html