134,728 Hits in 6.2 sec

Advancing Uncertainty: Untangling and Discerning Related Concepts

Janice Penrod
2002 International Journal of Qualitative Methods  
Through concept analysis, the concept was deconstructed to identify conceptual components and gaps in understanding.  ...  In this section, I describe methodological perspectives of a project designed to advance the concept of uncertainty using multiple qualitative methods.  ...  Thus, this project of advancing the concept of uncertainty produced a more coherent concept of broader scope in a manner that addressed a significant threat to validity: conceptual tunnel vision.  ... 
doi:10.1177/160940690200100407 fatcat:g3tw5o4ckraalevzdl6523qao4

Understanding Health Care Outcomes Research

Deborah A. Schwartz
2010 Journal of Hand Therapy  
The conceptual model serves as an important guide for addressing all the aspects of the research design.—DeEBORAH A. SCHWARTZ, OTR/L, CHT PAIN Solutions. A. Lee Dellon, MD, PhD, FACS.  ...  Readers are also introduced to the concept of validity threats toa study.  ... 
doi:10.1016/j.jht.2010.04.001 fatcat:g5qh5nqe75aj7aouigevao3fjm

Your Password Is Music To My Ears: Cloud Based Authentication Using Sound

Anthony Phipps, Karim Ouazzane, Vassil Vassilev
2021 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence)  
This paper details a threat modelling exercise and suggests a model to address the key threats whilst retaining the usability associated with voice driven systems, by using an additional sound based authentication  ...  This paper details the research in progress into identifying and addressing the threats faced by voice assistants and audio based digital systems.  ...  Threat modelling not only helps understand and prioritise the threats to be addressed but also outlines mitigation strategies that assist in the development of a conceptual model leading to a potential  ... 
doi:10.1109/confluence51648.2021.9377126 fatcat:cbn5oakcrfdilk3pckrezicp74

Review of Experimental and Quasi-experimental Designs for Generalized Causal Inference

G Julnes
2004 Evaluation and Program Planning  
In this view, as Campbell (1986) put it, you add a placebo control to address construct validity, not internal validity.  ...  In sum, one does not add a placebo control simply to enhance construct validity but rather to address also internal validity on a more molecular level.  ... 
doi:10.1016/j.evalprogplan.2004.01.006 fatcat:q22ucab3yjcyfbqomxu3m2whiu

A Conceptual Model to Address the Communication and Coordination Challenges during Requirements Change Management in Global Software Development

Saim Qureshi, Saif Ur Rehman Khan, Inayat-ur-Rehman, Yasir Javed, Shahzad Saleem, Abid Iqbal
2021 IEEE Access  
To validate the proposed conceptual model, we have conducted a questionnaire-based survey to procure the results from the industrial experts working in the GSD domain.  ...  In the literature, the researchers have concluded that a conceptual model can effectively reduce the communication and coordination challenges during RCM in GSD.  ...  Moreover, we are thankful to the industrial experts who helped us by validating the usability and effectiveness of the proposed conceptual model.  ... 
doi:10.1109/access.2021.3091603 fatcat:4mnd6ygw6ngfrgeuwhh6egdhda

Page 1063 of Behavior Research Methods Vol. 41, Issue 4 [page]

2009 Behavior Research Methods  
1979; Shadish et al., 2002)—that is, a threat to the validity of a statistical model used to evaluate the observed correlations among the data.  ...  In general, threats to inter¬ nal validity focus on experimental design issues within the experiment, and threats to external validity focus on Research Design and MRIs 1063 experimental design issues  ... 

PAIN Solutions

Cynthia T. Kwasniewski
2010 Journal of Hand Therapy  
The conceptual model serves as an important guide for addressing all the aspects of the research design.—DeEBORAH A. SCHWARTZ, OTR/L, CHT PAIN Solutions. A. Lee Dellon, MD, PhD, FACS.  ...  Readers are also introduced to the concept of validity threats toa study.  ... 
doi:10.1016/j.jht.2010.04.002 fatcat:erehz4ggcrbddk2hatpiitfzum

Campbell's and Rubin's perspectives on causal inference

Stephen G. West, Felix Thoemmes
2010 Psychological methods  
The authors highlight dimensions on which the 2 approaches have different emphases, including the roles of constructs versus operations, threats to validity versus assumptions, methods of addressing threats  ...  Campbell's approach focuses on the identification of threats to validity and the inclusion of design features that may prevent those threats from occurring or render them implausible.  ...  The typical threats to a design may not be plausible in a specific research area. Addressing threats to internal validity: Design elements.  ... 
doi:10.1037/a0015917 pmid:20230100 fatcat:qiux4w4bhbadndqlqywmtce6wu

Further Validation of Measures of Target Detection and Stereotype Activation in the Stereotype Misperception Task

Regina Reichardt, Andrew M. Rivers, Joerg Reichardt, Jeffrey W. Sherman
2020 Frontiers in Psychology  
To this end, the data from Experiment 2 and Experiment 4 in Krieglmeyer and Sherman (2012) were re-analyzed using a bootstrap method to investigate the robustness of the results.  ...  Previous research presented a multinomial model to estimate four latent processes (target detection, stereotype activation, stereotype application, guessing) that contribute to responses in the Stereotype  ...  ACKNOWLEDGMENTS We thank Karl Christoph Klauer for the suggestion to conduct bootstrap analyses.  ... 
doi:10.3389/fpsyg.2020.573985 pmid:33224069 pmcid:PMC7674274 fatcat:v4lrikcq5rc27oecy4kf5alshu

Methodological criteria for evaluating occupational safety intervention research

Harry S Shannon, Lynda S Robson, Stephen J Guastello
1999 Safety Science  
The areas are: intervention objectives and their conceptual basis; study design; external validity; outcome measurement; use of qualitative data; threats to internal validity; statistical analysis; and  ...  Larsson, John Bisby, Ricardo Montero Martinez and Carin Sundstrom-Frisk are appreciated for their contribution to the content and form of this manuscript.  ...  Threats to internal validity . Were the major threats to internal validity addressed in the study?  ... 
doi:10.1016/s0925-7535(98)00063-0 fatcat:rvcy2wkfnjcahg323cakhxrmqe

Challenges of implementation and implementation research: Learning from an intervention study designed to improve tumor registry reporting

Ann Scheck McAlearney, Daniel M Walker, Jennifer Livaudais-Toman, Michael Parides, Nina A Bickell
2016 SAGE Open Medicine  
We present a revised conceptual model that incorporates the sources of these unanticipated challenges.  ...  In this article, we use our study to examine the challenges of implementation research in health care, and our experience can help future implementation efforts.  ...  Informed consent Informed consent was obtained either in writing or via telephone from all subjects participating in the study.  ... 
doi:10.1177/2050312116666215 pmid:27635248 pmcid:PMC5011387 fatcat:huhrldheijcxxf2dvfgq7f2o3q

Privacy Requirements Engineering in Agile Software Development: a Specification Method

Mariana Maia Peixoto
2020 Requirements Engineering: Foundation for Software Quality  
Fourth, the evaluation through scenarios, a controlled experiment, and a case study with ASD experts. [Contribution] Partial results have shown that PCM produces good quality specifications.  ...  First, a systematic literature review to identify the privacy related concepts. Second, a case study and survey with software developers to understand how they deal with privacy in ASD.  ...  I would like to thank the valuable contribution of Carla Silva, João Araújo, Tony Gorschek, and Daniel Mendez, among other researchers.  ... 
dblp:conf/refsq/Peixoto20 fatcat:edptai57g5fctoaltb6p7tzgda

Problem-based Elicitation of Security Requirements - The ProCOR Method

Roman Wirtz, Maritta Heisel, Rene Meis, Aida Omerovic, Ketil Stølen
2018 Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering  
Eliciting security requirements should be done in a systematic way. We propse a method to elicit security requirements that address unacceptable risks.  ...  The security of a software system can be compromised by threats, which may harm assets with a certain likelihood, thus constituting a risk.  ...  Conceptual Model The conceptual model is shown in Figure 2 as a UML class diagram. All multiplicities not specifically mentioned are considered as 1.  ... 
doi:10.5220/0006669400260038 dblp:conf/enase/WirtzHMOS18 fatcat:6zxtfdldqjephpdrdsd4taq4gq

Stroke Caregiver Outcomes from the Telephone Assessment and Skill-Building Kit (TASK)

Tamilyn Bakas, Carol J. Farran, Joan K. Austin, Barbara A. Given, Elizabeth A. Johnson, Linda S. Williams
2009 Topics in Stroke Rehabilitation  
Method-Guided by a conceptual model, 6 outcomes (optimism, task difficulty, threat appraisal, depressive symptoms, life changes, general health perceptions) were measured in 40 caregivers randomized to  ...  Results-Significant increases in optimism at 4 weeks, 8 weeks, and 12 weeks were found, with medium effect sizes for the TASK group relative to the control group (p < .05).  ...  A conceptual model derived from Lazarus' theory 51, 52 was used to evaluate the TASK intervention.  ... 
doi:10.1310/tsr1602-105 pmid:19581197 pmcid:PMC3021456 fatcat:7jfq3eutxfgdpk66wtsgkz4an4

Security Versus Liberty in the Context of Counterterrorism: An Experimental Approach

Blake E. Garcia, Nehemia Geva
2014 Terrorism and Political Violence  
Furthermore, we find these results to be specific to the context of a transnational terror threat.  ...  The results provide evidence that the public is more willing to accept greater reductions in civil liberties under a greater threat of terrorism only when the perceived effectiveness of those policies  ...  We would like to thank Paul Gill, Joseph Young, and two anonymous reviewers for their helpful comments. We also thank Uri Geva and Infinity-Design for programming of the Dec-Tracer. Notes  ... 
doi:10.1080/09546553.2013.878704 fatcat:duu47yir2vdefmg5garteiovxy
« Previous Showing results 1 — 15 out of 134,728 results