<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cher&#039;s canvas &#187; Extracts</title>
	<atom:link href="https://jollyvip.com/research/category/extracts/feed/" rel="self" type="application/rss+xml" />
	<link>https://jollyvip.com/research</link>
	<description>Exploring the messy confluence of technology and people (law)</description>
	<lastBuildDate>Mon, 20 Feb 2023 16:44:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
		<item>
		<title>MyThesisChapter 1</title>
		<link>https://jollyvip.com/research/2020/06/30/mythesischapter-1/</link>
		<comments>https://jollyvip.com/research/2020/06/30/mythesischapter-1/#comments</comments>
		<pubDate>Tue, 30 Jun 2020 21:57:34 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2020]]></category>
		<category><![CDATA[Extracts]]></category>
		<category><![CDATA[PhD]]></category>
		<category><![CDATA[Thesis]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=1360</guid>
		<description><![CDATA[My Thesis is still embargoed. Recently, someone (a researcher?) requested a copy, giving the following reason: We are doing some research into a PIA system and would like to read your full paper. We will obviously credit your research in our findings and presentations. Please consider removing restrictions or uploading the full text to the <a href='https://jollyvip.com/research/2020/06/30/mythesischapter-1/' class='excerpt-more'>[...]</a>]]></description>
			<content:encoded><![CDATA[<p>My Thesis is still embargoed. Recently, someone (a researcher?) requested a copy, giving the following reason: <em>We are doing some research into a PIA system and would like to read your full paper. We will obviously credit your research in our findings and presentations.<br />
Please consider removing restrictions or uploading the full text to the archive so that it will be available immediately to future searchers.</em></p>
<p>For now, here&#8217;s <a href='http://jollyvip.com/research/files/2020/06/ThesisCherDeveyJune2019Chap1.pdf'>Chapter 1 and the Table of Contents and preambles.</a> (pdf)</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2020/06/30/mythesischapter-1/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>semiotics in a diagram</title>
		<link>https://jollyvip.com/research/2016/08/20/semiotics-in-a-diagram/</link>
		<comments>https://jollyvip.com/research/2016/08/20/semiotics-in-a-diagram/#comments</comments>
		<pubDate>Sat, 20 Aug 2016 10:32:26 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2016]]></category>
		<category><![CDATA[Extracts]]></category>
		<category><![CDATA[semiotic]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=1049</guid>
		<description><![CDATA[semiotics in a diagram extracted from &#8216;https://www.asis.org/Conferences/AM06/proceedings/papers/66/limages/66_fig_2.pdf]]></description>
			<content:encoded><![CDATA[<p><a href="http://jollyvip.com/research/files/2016/08/Semiotics.png"><img src="http://jollyvip.com/research/files/2016/08/Semiotics.png" alt="" title="semiotics in a diagram" width="926" height="550" class="aligncenter size-full wp-image-895" />semiotics in a diagram</a> extracted from &#8216;https://www.asis.org/Conferences/AM06/proceedings/papers/66/limages/66_fig_2.pdf</a></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2016/08/20/semiotics-in-a-diagram/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Why semiotics?</title>
		<link>https://jollyvip.com/research/2016/08/12/why-semiotics/</link>
		<comments>https://jollyvip.com/research/2016/08/12/why-semiotics/#comments</comments>
		<pubDate>Fri, 12 Aug 2016 13:39:00 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2016]]></category>
		<category><![CDATA[Extracts]]></category>
		<category><![CDATA[semiotic]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=1057</guid>
		<description><![CDATA[Semiotics is important because it can help us not to take &#8216;reality&#8217; for granted as something having a purely objective existence which is independent of human interpretation. It teaches us that reality is a system of signs. Studying semiotics can assist us to become more aware of reality as a construction and of the roles <a href='https://jollyvip.com/research/2016/08/12/why-semiotics/' class='excerpt-more'>[...]</a>]]></description>
			<content:encoded><![CDATA[<p><em>Semiotics is important because it can help us not to take &#8216;reality&#8217; for granted as something having a purely objective existence which is independent of human interpretation. It teaches us that reality is a system of signs. Studying semiotics can assist us to become more aware of reality as a construction and of the roles played by ourselves and others in constructing it. It can help us to realize that<br />
information or meaning is not &#8216;contained&#8217; in the world or in books, computers or audio-visual media.<br />
Meaning is not &#8216;transmitted&#8217; to us &#8211; we actively create it according to a complex interplay of codes or conventions of which we are normally unaware. Becoming aware of such codes is both inherently fascinating and intellectually empowering. We learn from semiotics that we live in a world of signs and we have no way of understanding anything except through signs and the codes into which they are organized.<br />
Through the study of semiotics we become aware that these signs and codes are normally transparent and disguise our task in &#8216;reading&#8217; them. Living in a world of increasingly visual signs, we need to learn that even the most &#8216;realistic&#8217; signs are not what they appear to be.<br />
By making more explicit the codes by which signs are interpreted we may perform the valuable semiotic function of &#8216;denaturalizing&#8217; signs. In defining realities signs serve ideological functions. Deconstructing and contesting the realities of signs can reveal whose realities are privileged and whose are suppressed.<br />
The study of signs is the study of the construction and maintenance of reality. To decline such a study is to leave to others the control of the world of meanings which we inhabit.</em><br />
Extracted from &#8216;Semiotics for Beginners by Daniel Chandler&#8217; </p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2016/08/12/why-semiotics/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>transdisciplinary framework</title>
		<link>https://jollyvip.com/research/2016/08/05/transdisciplinary-framework/</link>
		<comments>https://jollyvip.com/research/2016/08/05/transdisciplinary-framework/#comments</comments>
		<pubDate>Fri, 05 Aug 2016 17:18:38 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2016]]></category>
		<category><![CDATA[Extracts]]></category>
		<category><![CDATA[Misc]]></category>
		<category><![CDATA[semiotic]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=1044</guid>
		<description><![CDATA[Caught between three world views as described in this passage: Scientific knowledge is constructed socially by subjective minds interacting with nature. It, therefore, seems obvious that we have to admit that our inner “subjective” world is as foundational a part of reality as “objective” external nature and “intersubjective” social worlds. But western scientific culture lacks <a href='https://jollyvip.com/research/2016/08/05/transdisciplinary-framework/' class='excerpt-more'>[...]</a>]]></description>
			<content:encoded><![CDATA[<p>Caught between three world views as described in this passage:<br />
<em><br />
Scientific knowledge is constructed socially by subjective minds interacting with nature. It, therefore, seems obvious that we have to admit that our inner “subjective” world is as foundational a part of reality as “objective” external nature and “intersubjective” social worlds.</p>
<p>But western scientific culture lacks a transdisciplinary framework that can encompass all three worlds without reducing any of them to byproducts of the development of one of the others. We need such a non-reductionistic framework more than ever as our basic problems often arise in the gaps between the recognized disciplines.</p>
<p>Interdisciplinary work needs a transdisciplinary framework for mutual orientation and context determination.</p>
<p>A sort of common map, so to speak, on which to point out, recognize and understand each other’s territories..</em></p>
<p>Extracted from: &#8216;The necessity of Trans-Scientific Frameworks for doing Interdisciplinary Research&#8217; by Professor Søren Brier </p>
<p>Now, how do I apply the theory and the transdiscipinary framework for my research on data breach incident response?</p>
<p>It seems that on initial exploration, Peirce&#8217;s work on Semiotics provided the necessary framework in the form of Firstness, Secondness, Thirdness &#8211; Peirce&#8217;s ternary.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2016/08/05/transdisciplinary-framework/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>On standards, procedures and policies</title>
		<link>https://jollyvip.com/research/2016/08/05/on-standards-procedures-and-policies/</link>
		<comments>https://jollyvip.com/research/2016/08/05/on-standards-procedures-and-policies/#comments</comments>
		<pubDate>Fri, 05 Aug 2016 01:54:55 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2016]]></category>
		<category><![CDATA[Extracts]]></category>
		<category><![CDATA[policies]]></category>
		<category><![CDATA[procedures]]></category>
		<category><![CDATA[standards]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=1042</guid>
		<description><![CDATA[They are all essentially saying the same thing: Which is &#8211; don’t be careless, don’t be reckless, don’t be rude and don’t be an idiot. An interviewee&#8217;s comment on the various data protection and privacy standards, procedures and policies.]]></description>
			<content:encoded><![CDATA[<p>They are all essentially saying the same thing:</p>
<p>Which is &#8211; <strong>don’t be careless, don’t be reckless, don’t be rude and don’t be an idiot</strong>.  </p>
<p>An interviewee&#8217;s comment on the various data protection and privacy standards, procedures and policies.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2016/08/05/on-standards-procedures-and-policies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>OASIS Cyber Threat Intelligence Technical Committee（CTI TC）</title>
		<link>https://jollyvip.com/research/2015/09/07/oasis-cyber-threat-intelligence-technical-committee%ef%bc%88cti-tc%ef%bc%89/</link>
		<comments>https://jollyvip.com/research/2015/09/07/oasis-cyber-threat-intelligence-technical-committee%ef%bc%88cti-tc%ef%bc%89/#comments</comments>
		<pubDate>Mon, 07 Sep 2015 19:18:40 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Extracts]]></category>
		<category><![CDATA[incidents]]></category>
		<category><![CDATA[US]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=937</guid>
		<description><![CDATA[OASIS Cyber Threat Intelligence Technical Committee（CTI TC） Extracted information from the site; Overview The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence. In the initial phase of TC work, three specifications will be transitioned <a href='https://jollyvip.com/research/2015/09/07/oasis-cyber-threat-intelligence-technical-committee%ef%bc%88cti-tc%ef%bc%89/' class='excerpt-more'>[...]</a>]]></description>
			<content:encoded><![CDATA[<p><a href="https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=cti" title="OASIS Cyber Threat Intelligence community" target="_blank">OASIS Cyber Threat Intelligence Technical Committee（CTI TC） </a></p>
<p>Extracted information from the site;<br />
Overview</p>
<p>The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence. In the initial phase of TC work, three specifications will be transitioned from the US Department of Homeland Security (DHS) for development and standardization under the OASIS open standards process: STIX (Structured Threat Information Expression), TAXII (Trusted Automated Exchange of Indicator Information), and CybOX (Cyber Observable Expression).</p>
<p>The OASIS CTI Technical Committee will:</p>
<p>    define composable information sharing services for peer-to-peer, hub-and-spoke, and source subscriber threat intelligence sharing models<br />
    develop standardized representations for campaigns, threat actors, incidents, tactics techniques and procedures (TTPs), indicators, exploit targets, observables, and courses of action<br />
    develop formal models that allow organizations to develop their own standards-based sharing architectures to meet specific needs</p>
<p>I will certainly be interested in the &#8216;incidents, indicators, observables and courses of action&#8217;. Anything shareable is worth researching.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2015/09/07/oasis-cyber-threat-intelligence-technical-committee%ef%bc%88cti-tc%ef%bc%89/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>incident management process</title>
		<link>https://jollyvip.com/research/2015/08/03/incident-management-process/</link>
		<comments>https://jollyvip.com/research/2015/08/03/incident-management-process/#comments</comments>
		<pubDate>Mon, 03 Aug 2015 14:32:52 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Extracts]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=894</guid>
		<description><![CDATA[The incident management process, extracted from &#8216;Information security incident management: Current practice as reported in the literature&#8217; by Tøndel, Inger Anne and Line, Maria B. and Jaatun, Martin Gilje]]></description>
			<content:encoded><![CDATA[<p><a href="http://jollyvip.com/research/files/2015/08/Screenshot-2015-08-03-11.10.59.png"><img src="http://jollyvip.com/research/files/2015/08/Screenshot-2015-08-03-11.10.59.png" alt="" title="Screenshot 2015-08-03 11.10.59" width="926" height="550" class="aligncenter size-full wp-image-895" />The incident management process, extracted from &#8216;Information security incident management: Current practice as reported in the literature&#8217; by Tøndel, Inger Anne and Line, Maria B. and Jaatun, Martin Gilje</a></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2015/08/03/incident-management-process/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Saltzer-Schroeder principles</title>
		<link>https://jollyvip.com/research/2015/07/23/saltzer-schroeder-principles/</link>
		<comments>https://jollyvip.com/research/2015/07/23/saltzer-schroeder-principles/#comments</comments>
		<pubDate>Thu, 23 Jul 2015 21:07:30 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Extracts]]></category>
		<category><![CDATA[Month-by-month]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=888</guid>
		<description><![CDATA[My research is not directly on &#8216;secure system design and development&#8217;. Still..it is worth posting the Saltzer-Schroeder principles here to remind myself that there are principles that all software engineers and cybersecurity researchers are embracing. Are they embracing these principles? The following texts are extracted from this report,&#8217;Towards a Safer and More Secure Cyberspace&#8216; issued <a href='https://jollyvip.com/research/2015/07/23/saltzer-schroeder-principles/' class='excerpt-more'>[...]</a>]]></description>
			<content:encoded><![CDATA[<p>My research is not directly on &#8216;secure system design and development&#8217;. Still..it is worth posting the Saltzer-Schroeder principles here to remind myself that there are principles that all software engineers and cybersecurity researchers are embracing. <strong>Are they embracing these principles?</strong></p>
<p>The following texts are extracted from this report,&#8217;<a href="http://www.dhs.gov/sites/default/files/publications/csd-toward_a_safer_and_more_secure_cyberspace-full_report.pdf" title="towards a safer and more secure cyberspace" target="_blank">Towards a Safer and More Secure Cyberspace</a>&#8216; issued by the National Academy of Sciences, US.</p>
<p>Box 4.1 summarizes the classic Saltzer-Schroeder principles, first published in 1975,<em> that have been widely embraced by cybersecurity researchers.</em> (my italic)</p>
<p>BOX 4.1<br />
The Saltzer-Schroeder Principles of Secure System Design and Development<br />
Saltzer and Schroeder articulate eight design principles that can guide system design and contribute to an implementation without security flaws:</p>
<p>• Economy of mechanism: The design should be kept as simple and small as possible. Design and implementation errors that result in unwanted access paths will not be noticed during normal use (since normal use usually does not include attempts to exercise improper access paths). As a result, techniques such as line-by-line inspection of software and physical examination of hardware that implements protection mechanisms are necessary. For such techniques to be successful, a small and simple design is essential.</p>
<p>• Fail-safe defaults: Access decisions should be based on permission rather than exclusion. The default situation is lack of access, and the protection scheme identifies conditions under which access is permitted. The alternative, in which mechanisms attempt to identify conditions under which access should be refused, presents the wrong psychological base for secure system design. This principle applies both to the outward appearance of the protection mechanism and to its underlying implementation.</p>
<p>• Complete mediation: Every access to every object must be checked for authority. This principle, when systematically applied, is the primary under- pinning of the protection system. It forces a system-wide view of access control, which, in addition to normal operation, includes initialization, recovery, shutdown, and maintenance. It implies that a foolproof method of identifying the source of every request must be devised. It also requires that proposals to gain performance by remembering the result of an authority check be examined skeptically. If a change in authority occurs, such remembered results must be systematically updated.</p>
<p>• Open design: The design should not be secret. The mechanisms should not depend on the ignorance of potential attackers, but rather on the possession of specific, more easily protected, keys or passwords. This decoupling of protection mechanisms from protection keys permits the mechanisms to be examined by many reviewers without concern that the review may itself compromise the safeguards. In addition, any skeptical users may be allowed to convince themselves that the system they are about to use is adequate for their individual purposes. Finally, it is simply not realistic to attempt to maintain secrecy for any system that receives wide distribution.</p>
<p>• Separation of privilege: Where feasible, a protection mechanism that requires two keys to unlock it is more robust and flexible than one that allows access to the presenter of only a single key. The reason for this greater robustness and flexibility is that, once the mechanism is locked, the two keys can be physically separated and distinct programs, organizations, or individuals can be made responsible for them. From then on, no single accident, deception, or breach of trust is sufficient to compromise the protected information.</p>
<p>• Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job. This principle reduces the number of potential interactions among privileged programs to the minimum for correct operation, so that unintentional, unwanted, or improper uses of privilege are less likely to occur. Thus, if a question arises related to the possible misuse of a privilege, the number of programs that must be audited is minimized.</p>
<p>• Least common mechanism: The amount of mechanism common to more than one user and depended on by all users should be minimized. Every shared mechanism (especially one involving shared variables) represents a potential information path between users and must be designed with great care to ensure that it does not unintentionally compromise security. Further, any mechanism serving all users must be certified to the satisfaction of every user, a job presumably harder than satisfying only one or a few users.</p>
<p>• Psychological acceptability: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly. More generally, the use of protection mechanisms should not impose burdens on users that might lead users to avoid or circumvent them—when possible, the use of such mechanisms should confer a benefit that makes users want to use them. Thus, if the protection mechanisms make the system slower or cause the user to do more work—even if that extra work is “easy”—they are arguably flawed.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2015/07/23/saltzer-schroeder-principles/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Nine Patterns &#8211; Verizon 2014 report</title>
		<link>https://jollyvip.com/research/2015/04/25/nine-patterns-verizon-2014-report/</link>
		<comments>https://jollyvip.com/research/2015/04/25/nine-patterns-verizon-2014-report/#comments</comments>
		<pubDate>Sat, 25 Apr 2015 22:44:22 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2014]]></category>
		<category><![CDATA[Extracts]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=685</guid>
		<description><![CDATA[Catching up with my collection of notes and posting this Verizon 2014 image showing the nine common incident patterns. The report states &#8216;Within each of those patterns, we cover the actors who cause them, the actions they use, assets they target, timelines in which all this took place, and give specific recommendations to thwart them.&#8217; <a href='https://jollyvip.com/research/2015/04/25/nine-patterns-verizon-2014-report/' class='excerpt-more'>[...]</a>]]></description>
			<content:encoded><![CDATA[<p>Catching up with my collection of notes and posting this Verizon 2014 image showing the nine common incident patterns. The report states &#8216;Within each of those patterns, we cover the actors who cause them, the actions they use, assets they target, timelines in which all this took place, and give specific recommendations to thwart them.&#8217;<br />
<a href="http://jollyvip.com/research/files/2015/04/nine-patterns-verizon1.png"><img src="http://jollyvip.com/research/files/2015/04/nine-patterns-verizon1.png" alt="" title="nine patterns verizon" width="703" height="640" class="aligncenter size-full wp-image-691" />Nine Patterns</a></p>
<p>BREACHES VS INCIDENTS?<br />
This report uses the following definitions:<br />
Incident: A security event that compromises the integrity, confidentiality, or availability of an information asset.<br />
Breach: An incident that results in the disclosure or potential exposure of data.<br />
Data disclosure: A breach for which it was confirmed that data was actually disclosed (not just exposed) to an unauthorized party.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2015/04/25/nine-patterns-verizon-2014-report/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Making sense of the *ogies</title>
		<link>https://jollyvip.com/research/2014/09/09/making-sense-of-the-ogies/</link>
		<comments>https://jollyvip.com/research/2014/09/09/making-sense-of-the-ogies/#comments</comments>
		<pubDate>Tue, 09 Sep 2014 15:38:10 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Extracts]]></category>
		<category><![CDATA[How To]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=631</guid>
		<description><![CDATA[How many *ogies related terms do I really know and understand? Being a software analyst (plus other &#8216;beings&#8217;), I tend to start looking for ways or more formally, a methodology to &#8216;identify or classify&#8217; objects that I&#8217;m interested in exploring. There&#8217;s a saying in management speak that &#8216;you can&#8217;t manage (it) if you can&#8217;t measure <a href='https://jollyvip.com/research/2014/09/09/making-sense-of-the-ogies/' class='excerpt-more'>[...]</a>]]></description>
			<content:encoded><![CDATA[<p><em>How many *ogies related terms do I really know and understand?</em></p>
<p>Being a software analyst (plus other &#8216;beings&#8217;), I tend to start looking for ways or more formally, a methodology to &#8216;identify or classify&#8217; objects that I&#8217;m interested in exploring.</p>
<p>There&#8217;s a saying in management speak that &#8216;you can&#8217;t manage (it) if you can&#8217;t measure (it)&#8217;<br />
To measure it, one has to also know what is &#8216;it&#8217; I want measuring, so the first step appears to be &#8216;identify it&#8217;.<br />
Well, this is assuming I have also set up my context for &#8216;identifying it&#8217;.</p>
<p>In the world of research, &#8216;identification or classification&#8217; is considered as &#8216;the most central and generic conceptual exercises&#8217;. Conceptually this takes two forms of classification namely typologies and taxonomies. </p>
<p>Further clues are in this article;<br />
G. Par´e, M.-C. Trudel, M. Jaana, S. Kitsiou, Synthesizing Information Systems Knowledge: A Typology of Literature Reviews, Information and Management (2014), http://dx.doi.org/10.1016/j.im.2014.08.008</p>
<p>In essence, typology is derived deductively and taxonomy is usually derived empirically or inductively using cluster analysis or other statistical methods.</p>
<p>Which term to use depends on what I want to do with it.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2014/09/09/making-sense-of-the-ogies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
