A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Advancing Uncertainty: Untangling and Discerning Related Concepts
2002
International Journal of Qualitative Methods
Through concept analysis, the concept was deconstructed to identify conceptual components and gaps in understanding. ...
In this section, I describe methodological perspectives of a project designed to advance the concept of uncertainty using multiple qualitative methods. ...
Thus, this project of advancing the concept of uncertainty produced a more coherent concept of broader scope in a manner that addressed a significant threat to validity: conceptual tunnel vision. ...
doi:10.1177/160940690200100407
fatcat:g3tw5o4ckraalevzdl6523qao4
Understanding Health Care Outcomes Research
2010
Journal of Hand Therapy
The conceptual model serves as an important guide for addressing all the aspects of the research design.—DeEBORAH A. SCHWARTZ, OTR/L, CHT
PAIN Solutions. A. Lee Dellon, MD, PhD, FACS. ...
Readers are also introduced to the concept of validity threats toa study. ...
doi:10.1016/j.jht.2010.04.001
fatcat:g5qh5nqe75aj7aouigevao3fjm
Your Password Is Music To My Ears: Cloud Based Authentication Using Sound
2021
2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
This paper details a threat modelling exercise and suggests a model to address the key threats whilst retaining the usability associated with voice driven systems, by using an additional sound based authentication ...
This paper details the research in progress into identifying and addressing the threats faced by voice assistants and audio based digital systems. ...
Threat modelling not only helps understand and prioritise the threats to be addressed but also outlines mitigation strategies that assist in the development of a conceptual model leading to a potential ...
doi:10.1109/confluence51648.2021.9377126
fatcat:cbn5oakcrfdilk3pckrezicp74
Review of Experimental and Quasi-experimental Designs for Generalized Causal Inference
2004
Evaluation and Program Planning
In this view, as Campbell (1986) put it, you add a placebo control to address construct validity, not internal validity. ...
In sum, one does not add a placebo control simply to enhance construct validity but rather to address also internal validity on a more molecular level. ...
doi:10.1016/j.evalprogplan.2004.01.006
fatcat:q22ucab3yjcyfbqomxu3m2whiu
A Conceptual Model to Address the Communication and Coordination Challenges during Requirements Change Management in Global Software Development
2021
IEEE Access
To validate the proposed conceptual model, we have conducted a questionnaire-based survey to procure the results from the industrial experts working in the GSD domain. ...
In the literature, the researchers have concluded that a conceptual model can effectively reduce the communication and coordination challenges during RCM in GSD. ...
Moreover, we are thankful to the industrial experts who helped us by validating the usability and effectiveness of the proposed conceptual model. ...
doi:10.1109/access.2021.3091603
fatcat:4mnd6ygw6ngfrgeuwhh6egdhda
Page 1063 of Behavior Research Methods Vol. 41, Issue 4
[page]
2009
Behavior Research Methods
1979; Shadish et al., 2002)—that is, a threat to the validity of a statistical model used to evaluate the observed correlations among the data. ...
In general, threats to inter¬ nal validity focus on experimental design issues within the experiment, and threats to external validity focus on
Research Design and MRIs 1063
experimental design issues ...
PAIN Solutions
2010
Journal of Hand Therapy
The conceptual model serves as an important guide for addressing all the aspects of the research design.—DeEBORAH A. SCHWARTZ, OTR/L, CHT
PAIN Solutions. A. Lee Dellon, MD, PhD, FACS. ...
Readers are also introduced to the concept of validity threats toa study. ...
doi:10.1016/j.jht.2010.04.002
fatcat:erehz4ggcrbddk2hatpiitfzum
Campbell's and Rubin's perspectives on causal inference
2010
Psychological methods
The authors highlight dimensions on which the 2 approaches have different emphases, including the roles of constructs versus operations, threats to validity versus assumptions, methods of addressing threats ...
Campbell's approach focuses on the identification of threats to validity and the inclusion of design features that may prevent those threats from occurring or render them implausible. ...
The typical threats to a design may not be plausible in a specific research area. Addressing threats to internal validity: Design elements. ...
doi:10.1037/a0015917
pmid:20230100
fatcat:qiux4w4bhbadndqlqywmtce6wu
Further Validation of Measures of Target Detection and Stereotype Activation in the Stereotype Misperception Task
2020
Frontiers in Psychology
To this end, the data from Experiment 2 and Experiment 4 in Krieglmeyer and Sherman (2012) were re-analyzed using a bootstrap method to investigate the robustness of the results. ...
Previous research presented a multinomial model to estimate four latent processes (target detection, stereotype activation, stereotype application, guessing) that contribute to responses in the Stereotype ...
ACKNOWLEDGMENTS We thank Karl Christoph Klauer for the suggestion to conduct bootstrap analyses. ...
doi:10.3389/fpsyg.2020.573985
pmid:33224069
pmcid:PMC7674274
fatcat:v4lrikcq5rc27oecy4kf5alshu
Methodological criteria for evaluating occupational safety intervention research
1999
Safety Science
The areas are: intervention objectives and their conceptual basis; study design; external validity; outcome measurement; use of qualitative data; threats to internal validity; statistical analysis; and ...
Larsson, John Bisby, Ricardo Montero Martinez and Carin Sundstrom-Frisk are appreciated for their contribution to the content and form of this manuscript. ...
Threats to internal validity . Were the major threats to internal validity addressed in the study? ...
doi:10.1016/s0925-7535(98)00063-0
fatcat:rvcy2wkfnjcahg323cakhxrmqe
Challenges of implementation and implementation research: Learning from an intervention study designed to improve tumor registry reporting
2016
SAGE Open Medicine
We present a revised conceptual model that incorporates the sources of these unanticipated challenges. ...
In this article, we use our study to examine the challenges of implementation research in health care, and our experience can help future implementation efforts. ...
Informed consent Informed consent was obtained either in writing or via telephone from all subjects participating in the study. ...
doi:10.1177/2050312116666215
pmid:27635248
pmcid:PMC5011387
fatcat:huhrldheijcxxf2dvfgq7f2o3q
Privacy Requirements Engineering in Agile Software Development: a Specification Method
2020
Requirements Engineering: Foundation for Software Quality
Fourth, the evaluation through scenarios, a controlled experiment, and a case study with ASD experts. [Contribution] Partial results have shown that PCM produces good quality specifications. ...
First, a systematic literature review to identify the privacy related concepts. Second, a case study and survey with software developers to understand how they deal with privacy in ASD. ...
I would like to thank the valuable contribution of Carla Silva, João Araújo, Tony Gorschek, and Daniel Mendez, among other researchers. ...
dblp:conf/refsq/Peixoto20
fatcat:edptai57g5fctoaltb6p7tzgda
Problem-based Elicitation of Security Requirements - The ProCOR Method
2018
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering
Eliciting security requirements should be done in a systematic way. We propse a method to elicit security requirements that address unacceptable risks. ...
The security of a software system can be compromised by threats, which may harm assets with a certain likelihood, thus constituting a risk. ...
Conceptual Model The conceptual model is shown in Figure 2 as a UML class diagram. All multiplicities not specifically mentioned are considered as 1. ...
doi:10.5220/0006669400260038
dblp:conf/enase/WirtzHMOS18
fatcat:6zxtfdldqjephpdrdsd4taq4gq
Stroke Caregiver Outcomes from the Telephone Assessment and Skill-Building Kit (TASK)
2009
Topics in Stroke Rehabilitation
Method-Guided by a conceptual model, 6 outcomes (optimism, task difficulty, threat appraisal, depressive symptoms, life changes, general health perceptions) were measured in 40 caregivers randomized to ...
Results-Significant increases in optimism at 4 weeks, 8 weeks, and 12 weeks were found, with medium effect sizes for the TASK group relative to the control group (p < .05). ...
A conceptual model derived from Lazarus' theory 51, 52 was used to evaluate the TASK intervention. ...
doi:10.1310/tsr1602-105
pmid:19581197
pmcid:PMC3021456
fatcat:7jfq3eutxfgdpk66wtsgkz4an4
Security Versus Liberty in the Context of Counterterrorism: An Experimental Approach
2014
Terrorism and Political Violence
Furthermore, we find these results to be specific to the context of a transnational terror threat. ...
The results provide evidence that the public is more willing to accept greater reductions in civil liberties under a greater threat of terrorism only when the perceived effectiveness of those policies ...
We would like to thank Paul Gill, Joseph Young, and two anonymous reviewers for their helpful comments. We also thank Uri Geva and Infinity-Design for programming of the Dec-Tracer.
Notes ...
doi:10.1080/09546553.2013.878704
fatcat:duu47yir2vdefmg5garteiovxy
« Previous
Showing results 1 — 15 out of 134,728 results