- Digital Humanities and Scholarship
- Research Data Management Practices
- International Law and Human Rights
- Network Security and Intrusion Detection
- Medieval Literature and History
- Semantic Web and Ontologies
- Library Science and Information Systems
- Scientific Computing and Data Management
- Global Peace and Security Dynamics
- Wikis in Education and Collaboration
- Advanced Malware Detection Techniques
- Historical and Archaeological Studies
- Mobile Agent-Based Network Management
- Comparative constitutional jurisprudence studies
- scientometrics and bibliometrics research
- Reflective Practices in Education
- Historical Geography and Cartography
- Mobile and Web Applications
- Cybercrime and Law Enforcement Studies
- Expert finding and Q&A systems
- Academic Freedom and Politics
- Publishing and Scholarly Communication
- Intelligent Tutoring Systems and Adaptive Learning
- Management and Organizational Studies
- Human Rights and Immigration
Manchester Metropolitan University
2024
University of Lethbridge
2010-2023
University College Dublin
1971-2022
Statistisches Bundesamt
2020
Ben-Gurion University of the Negev
2017
University of California, San Diego
2017
Universidad de Londres
2017
University of Pisa
2013
University of Chicago
1995
University of Notre Dame
1995
Abstract The rhetoric of “excellence” is pervasive across the academy. It used to refer research outputs as well researchers, theory and education, individuals organizations, from art history zoology. But does actually mean anything? Does this narrative do any good? Drawing on a range sources we interrogate concept find that it has no intrinsic meaning in academia. Rather functions linguistic interchange mechanism. To investigate whether function useful examine how excellence combines with...
<ns4:p>Peer review of research articles is a core part our scholarly communication system. In spite its importance, the status and purpose peer often contested. What role in modern digital communications infrastructure? Does it perform to high standards with which generally regarded? Studies have shown that prone bias abuse numerous dimensions, frequently unreliable, can fail detect even fraudulent research. With advent web technologies, we are now witnessing phase innovation experimentation...
Abstract This paper explores the growing complexity of detecting and differentiating generative AI from other interventions. Initially prompted by noticing how tools like Grammarly were being flagged detection software, it examines these popular such as Grammarly, EditPad, Writefull, models ChatGPT Microsoft Bing Copilot affect human-generated texts accurately current AI-detection systems, including Turnitin GPTZero, can assess for use tools. The results highlight that widely used writing...
<ns4:p>Peer review of research articles is a core part our scholarly communication system. In spite its importance, the status and purpose peer often contested. What role in modern digital communications infrastructure? Does it perform to high standards with which generally regarded? Studies have shown that prone bias abuse numerous dimensions, frequently unreliable, can fail detect even fraudulent research. With advent Web technologies, we are now witnessing phase innovation experimentation...
UN human rights mechanisms continue to proliferate, producing numerous decisions and voluminous reports. This article reviews the ways in which such apply international humanitarian law, including law of Geneva The Hague. In doing so, it focuses mainly on practice rapporteurs appointed by Commission Human Rights investigate situations specific countries that thematic working groups has entrusted with monitoring types serious violations wherever they occur, particular Special Rapporteur...
<ns4:p>Peer review of research articles is a core part our scholarly communication system. In spite its importance, the status and purpose peer often contested. What role in modern digital communications infrastructure? Does it perform to high standards with which generally regarded? Studies have shown that prone bias abuse numerous dimensions, frequently unreliable, can fail detect even fraudulent research. With advent web technologies, we are now witnessing phase innovation experimentation...
Part II of the Siracusa Principles interprets principal limitations on derogation set forth in Covenant as well certain derived from other sources international law and makes suggestions to supervision derogations human rights norms. Unfortunately, lack time prevented adequate consideration all aspects these questions, notably non-discrimination clause Article 4(1). The principles contained herein, therefore, while undoubtedly constituting a major contribution legal doctrine this topic,...
Abstract During the second half of twentieth century international community, facing terrorist phenomenon, reacted with adoption a series treaties concerning specific types acts, and obligations states regard to them. Alternatively terrorism-oriented legislation, which initially covered only acts affecting civilians, has gradually expanded cover some terrorism against military personnel installations. This contribution attempts assess repercussions this evolution on status protection armed...
Despite all available technology and despite major disruptions that the internet brought about in many sectors of modern life, scholarly communication has only seen change at glacial pace. Many useful, laudable tools services are being developed to solve specific issues for particular domain groups. However, question how these efforts fit together remains largely unaddressed. If we have alternative models parts system, will result a coherent system? Will it be interoperable? appeal people as...
This special issue of Digital Medievalist celebrates the close collaboration and communication that has been exercised between Classicist organisations since their respective inceptions. Although two overlap in membership interests, strength as organisations—and success cooperation—comes from ability to maintain distinct identities. Each organisation provides a disciplinary home allows its members explore digital technology within familiar community.
This article revisits the question of intellectual adequacy print critical edition. Contemporary theory and current digital practice have encouraged editors users editions to dismiss various aspects edition–particularly reading text apparatus–as artifacts an obsolete technology. Using database theory, author shows how many these basic elements in fact represent most intellectually efficient possible way organizing information about texts readings their underlying witnesses. By recognizing...
A selection of analyses and articles about open data, curated by Figshare. Foreword Sir Nigel Shadbolt.
The Dream of the Rood is one earliest Christian poems in Old English and an example genre dream poetry. While a complete text can be found 10th-century “Vercelli Book,” poem considerably older, its oldest occurrence carved (in runes) on 7- to 8th-century Ruthwell Stone Cross. In this article, we present work done framework “Visionary Cross” project, starting from digitization Cross creation web-based digital edition , as it 3D data has been collected processed with explicit aim creating...