Results for 'research tactics'

970 found
Order:
  1. Willpower needs tactical skill.Juan Pablo Bermúdez - 2021 - Behavioral and Brain Sciences 44 (e32):17–18.
    In “Willpower with and without effort”, G. Ainslie advances our understanding of selfcontrol by theoretically unifying multiple forms of willpower. But one crucial question remains unanswered: How do agents pick the right forms of willpower in each situation? I argue that willpower requires tactical skill, which detects willpower-demanding contexts, selects context-appropriate tactics, and monitors their implementation. Research on tactical skill will significantly advance our understanding of willpower.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Deterrence and the Decapitation Tactics as a Strategy for Counter-terrorism.Emmanuel Ofuasia & Patrick Effiong Ben - forthcoming - Journal of Military Ethics.
    Some scholars have lauded the decapitation tactics as a relevant approach by Nigeria, the United States of America and Israel in their struggle against the expansion and influence of terrorist groups. The decapitation strategy has, basically, three routes: killing, capturing, and capturing and then killing the leader(s) of terrorist cells. Through a critical analysis of the arguments for the decapitation strategy, this research contends that this approach will not stem the proliferation of terrorist groups. The elimination of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Interdisciplinary Urban Interventions: Fostering Social Justice Through Collaborative Research-Led Design in Architectural Education.Asma Mehan & Natalia Dominguez - 2024 - Architecture 4 (4):1136-1156.
    This study aims to examine how interdisciplinary urban interventions within architectural education can effectively address social justice issues. Motivated by the growing need for inclusive and equitable urban spaces, this research explores the potential of collaborative design and participatory research methods to foster social awareness and community engagement. Focusing on student-led projects in cities such as Houston, San Diego, and Amsterdam, this study addresses social justice challenges across themes like Art Activism, Tactical Urbanism, environmental justice, and gender equity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Giving Moral Competence High Priority in Medical Education. New MCT-based Research Findings from the Polish Context.Ewa Nowak, Anna-Maria Barciszewska, Kay Hemmerling, Georg Lind & Sunčana Kukolja Taradi - 2021 - Ethics in Progress 12:104-133.
    Nowadays, healthcare and medical education is qualified by test scores and competitiveness. This article considers its quality in terms of improving the moral competence of future healthcare providers. Objectives. Examining the relevance of moral competence in medico-clinical decision-making despite the paradigm shift and discussing the up-to-date findings on healthcare students. Design and method. N=115 participants were surveyed with a standard Moral Competence Test to examine how their moral competence development was affected by the learning environment and further important factors. Results. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Менеджмент наукового пошуку: стратегія і тактика наукових досліджень.Alexey Dzhusov, Oleksandr Krupskyi, Yuliya Stasiuk & Olena Pryz - 2009 - Днипро, Днепропетровская область, Украина, 49000:
    Монографію присвячено теоретичним дослідженням менеджменту науки. Розглянуто сутність управління науковим пошуком як окремого виду діяльності. Досліджено шляхи вирішення фундаментальних та прикладних питань, які виникають під час проведення наукових досліджень та впровадження їх результатів. Визначено категорії культури наукового пошуку. Окрему увагу приділено питанням захисту інтелектуальної власності, а також презентації та комерціалізації результатів наукових розробок. Монографія буде корисною для магістрів, аспірантів, молодих науковців та усіх, хто займається науковими дослідженнями.
    Download  
     
    Export citation  
     
    Bookmark  
  6. Interpreting Straw Man Argumentation.Fabrizio Macagno & Douglas Walton - 2017 - Amsterdam: Springer.
    This book shows how research in linguistic pragmatics, philosophy of language, and rhetoric can be connected through argumentation to analyze a recognizably common strategy used in political and everyday conversation, namely the distortion of another’s words in an argumentative exchange. Straw man argumentation refers to the modification of a position by misquoting, misreporting or wrenching the original speaker’s statements from their context in order to attack them more easily or more effectively. Through 63 examples taken from different contexts (including (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  7. A New Theory of Serendipity: Nature, Emergence and Mechanism.Quan-Hoang Vuong (ed.) - 2022 - Berlin, Germany: De Gruyter.
    When you type the word “serendipity” in a word-processor application such as Microsoft Word, the autocorrection engine suggests you choose other words like “luck” or “fate”. This correcting act turns out to be incorrect. However, it points to the reality that serendipity is not a familiar English word and can be misunderstood easily. Serendipity is a very much scientific concept as it has been found useful in numerous scientific discoveries, pharmaceutical innovations, and numerous humankind’s technical and technological advances. Therefore, there (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  8. CONTEMPORARY DEVOPS STRATEGIES FOR AUGMENTING SCALABLE AND RESILIENT APPLICATION DEPLOYMENT ACROSS MULTI-CLOUD ENVIRONMENTS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):54-60.
    Containerization in a multi-cloud environment facilitates workload portability and optimized resource uti-lization. Containerization in multi-cloud environments has received significant attention in recent years both from academic research and industrial development perspectives. However, there exists no effort to systematically investigate the state of research on this topic. The aim of this research is to systematically identify and categorize the multiple aspects of containerization in multi-cloud environment. We conducted the Systematic Mapping Study (SMS) on the literature published between January (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  9. Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. In this research, (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  10. Resolving a moral conflict through discourse.Warren French & David Allbright - 1998 - Journal of Business Ethics 17 (2):177-194.
    Plato claimed that morality exits to control conflict. Business people increasingly are called upon to resolve moral conflicts between various stakeholders who maintain opposing ethical positions or principles. Attempts to resolve these moral conflicts within business discussions may be exacerbated if disputants have different communicative styles. To better understand the communication process involved in attempts to resolve a moral dilemma, we investigate the "discourse ethics" procedure of Jürgen Habermas. Habermas claims that an individual's level of moral reasoning parallels the type (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  11. “Somewhere I belong?” A study on transnational identity shifts caused by “double stigmatization” among Chinese international student returnees during COVID-19 through the lens of mindsponge mechanism.Ruining Jin & Xiao Wang - 2022 - Frontiers in Psychology 13:1018843.
    Chinese international students who studied in the United States received “double stigmatization” from American and Chinese authorities because of the “political othering” tactic during COVID-19. The research used a phenomenological approach to examine why and how specifically the transnational identity of Chinese international students in the United States shifted during the double stigmatization. The researcher conducted a total of three rounds of interviews with 15 Chinese international students who studied in the United States and returned to China between 2018 (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  12. Transformation of entrepreneurial leadership in the 21st century: prospects for the future.Igor Britchenko, Sergyi Smerichevskyi & Igor Kryvovyazyuk - 2018 - Advances in Social Science, Education and Humanities Research. – Atlantis Press: Proceedings of the 2nd International Conference on Social, Economic and Academic Leadership (ICSEAL 2018) 217:115-121.
    The 21st century imposed many challenges on mankind, among them there is a very important problem of entrepreneurial leadership transformation. Entrepreneurship gradual modification under the pressure of factors of innovation, informatization of the environment and the need for socialization of the relations between businessmen and society has led to the need of new understanding of leadership positions. The purpose of this scientific research is to substantiate the style of entrepreneurial leadership, which will become dominant in the 21st century. Analyzing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Necessity and Non-Combatant Immunity.Seth Lazar - 2014 - Review of International Studies (Firstview Online) 40 (1):53-76.
    The principle of non-combatant immunity protects non-combatants against intentional attacks in war. It is the most widely endorsed and deeply held moral constraint on the conduct of war. And yet it is difficult to justify. Recent developments in just war theory have undermined the canonical argument in its favour – Michael Walzer's, in Just and Unjust Wars. Some now deny that non-combatant immunity has principled foundations, arguing instead that it is entirely explained by a different principle: that of necessity. In (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Utilitarianism and its British nineteenth-century critics.Sergio Volodia Marcello Cremaschi - 2008 - Notizie di Politeia. Rivista di Etica E Scelte Pubbliche 24 (90):31-49.
    I try to reconstruct the hidden agenda of nineteenth-century British controversy between Utilitarianism and Intuitionism, going beyond the image, successfully created by the two Mills, of a battle between Prejudice and Reason. When examined in depth, competing philosophical outlooks turn out to be more research programs than self-contained doctrinal bodies, and such programs appear to be implemented, and indeed radically transformed while in progress thanks to their enemies no less than to their supporters. Controversies, the propelling devices of (...) programs, are real-words affairs, and philosophers do not engage in them just for the sake of the argument, but in order to win, and alignments are defined on the basis of strategic and tactical requirements that cross the boundaries of disciplines. I suggest that good objections and counter-objections, and most of all amendments of doctrines, were incidentally produced in the course of the fight, and they were no less valuable because of their being more side-effects than sought-for discoveries. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair, Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Informational Quality Labeling on Social Media: In Defense of a Social Epistemology Strategy.John P. Wihbey, Matthew Kopec & Ronald Sandler - manuscript
    Social media platforms have been rapidly increasing the number of informational labels they are appending to user-generated content in order to indicate the disputed nature of messages or to provide context. The rise of this practice constitutes an important new chapter in social media governance, as companies are often choosing this new “middle way” between a laissez-faire approach and more drastic remedies such as removing or downranking content. Yet information labeling as a practice has, thus far, been mostly tactical, reactive, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Vaunting the independent amateur: Scientific American and the representation of lay scientists.Sean F. Johnston - 2018 - Annals of Science 75 (2):97-119.
    This paper traces how media representations encouraged enthusiasts, youth and skilled volunteers to participate actively in science and technology during the twentieth century. It assesses how distinctive discourses about scientific amateurs positioned them with respect to professionals in shifting political and cultural environments. In particular, the account assesses the seminal role of a periodical, Scientific American magazine, in shaping and championing an enduring vision of autonomous scientific enthusiasms. Between the 1920s and 1970s, editors Albert G. Ingalls and Clair L. Stong (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. N = Many Me’s: Self-Surveillance for Precision Public Health.Hub Zwart & Mira Vegter - 2021 - Biosocieties 16.
    This paper focuses on Precision Public Health (PPH), described in the scientific literature as an effort to broaden the scope of precision medicine by extrap- olating it towards public health. By means of the “All of Us” (AoU) research pro- gram, launched by the National Institutes of Health in the U.S., PPH is being devel- oped based on health data shared through a broad range of digital tools. PPH is an emerging idea to harness the data collected for precision (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  13
    How the Profit Motive Influences Media’s Role in Politics and Product Innovation.Angelito Malicse - manuscript
    How the Profit Motive Influences Media’s Role in Politics and Product Innovation -/- Introduction -/- Media plays a crucial role in shaping public opinion, influencing political discourse, and driving consumer behavior. Ideally, journalism should serve as a watchdog, holding power accountable and informing the public with accurate, unbiased information. Similarly, the media’s role in promoting products should focus on genuine innovation that benefits society. However, the profit motive has significantly altered these dynamics. Instead of prioritizing public welfare, media institutions often (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Skeptically self-governed citizens: The 'volunteer!' injunction as a predicament of neoliberal life.Carlos Palacios - 2022 - Citizenship Studies 26 (2):221-244.
    The idea that anyone, with the right critical knowledge and a certain amount of spare time and resources, could become a globally responsible citizen has been skeptically questioned at least since the time of Rousseau. But, during the last two decades, the specific concern that has troubled critical qualitative researchers has been the possible complicity of the active citizen with a neoliberal regime of governmentality, a regime that often uses the injunction to volunteer as a political tactic of responsibilization. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  25
    AI-Powered Phishing Detection: Protecting Enterprises from Advanced Social Engineering Attacks.Bellamkonda Srikanth - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (1):12-20.
    Phishing, a prevalent form of social engineering attack, continues to threaten enterprises by exploiting human vulnerabilities and targeting sensitive information. With the increasing sophistication of phishing schemes, traditional detection methods often fall short in identifying and mitigating these threats. As attackers employ advanced techniques, such as highly personalized spear-phishing emails and malicious links, enterprises require innovative solutions to safeguard their digital ecosystems. This research explores the application of artificial intelligence (AI) in enhancing phishing detection and response, with a specific (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  20
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity challenges (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Police-Generated Killings: The Gap between Ethics and Law.Ben Jones - 2022 - Political Research Quarterly 75 (2):366-378.
    This article offers a normative analysis of some of the most controversial incidents involving police—what I call police-generated killings. In these cases, bad police tactics create a situation where deadly force becomes necessary, becomes perceived as necessary, or occurs unintentionally. Police deserve blame for such killings because they choose tactics that unnecessarily raise the risk of deadly force, thus violating their obligation to prioritize the protection of life. Since current law in the United States fails to ban many (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Modular Construction and Bioclimatic Strategies: A Sustainable Approach to Building Design.K. Xhexhi & Besnik Aliaj - 2024 - 4Th International Conference on Scientific and Academic Research Icsar 2024 4 (1):282-292.
    Usually, modular construction involves the off-site manufacturing of standard building components in a factory before the components are assembled on the construction site. It is common to use terms like "prefabrication," "off-site construction," and "modular construction" interchangeably. The construction of modular constructions nowadays is flourishing all over the globe. The roots of the Albanian prefabricated constructions are extended for the first time around the 1970s. This paper will indeed analyze some recently built modular construction in Albania, considering and comparing it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  48
    RANSOMWARE TRENDS AND EFFECTIVE MITIGATION TECHNIQUES IN 2018.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-5.
    : Ransomware remains one of the most significant cybersecurity threats, evolving rapidly with new attack vectors, encryption techniques, and extortion models. As we enter 2018, ransomware attacks have become more sophisticated, leveraging artificial intelligence (AI), automation, and emerging technologies to bypass traditional security measures. This paper analyzes the latest ransomware trends, including targeted attacks on critical infrastructure, Ransomware-as-a-Service (RaaS), and double/triple extortion tactics. Additionally, it explores advanced mitigation techniques such as AI-driven anomaly detection, zero-trust architectures, blockchain-based security solutions, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  45
    Global Readers’ Evaluation of Wild Wise Weird: The Kingfisher Story Collection.openAI Deep Research & La Viet Phuong - 2025 - Evaluation of Wild Wise Weird.
    This study examines how global readers evaluate Wild Wise Weird: The Kingfisher Story Collection and focuses on the book’s impact on readers’ learning and thinking. Wild Wise Weird is a collection of short fables centered on a character called the Kingfisher, originally written in Vietnamese and later made available to international audiences (Wild Wise Weird | Goodreads). The book’s author explicitly aimed to introduce readers around the world to snippets of Vietnamese culture through humorous storytelling, while also providing “food for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Spirit Tactics, Exorcising Dances.Joshua M. Hall - 2024 - Idealistic Studies 54 (1):27-48.
    In Michel de Certeau’s Invention of the Everyday, improvisational community dance function as a catalyst for the subversive art of the oppressed, via its ancient Greek virtue/power of mētis, being “foxlike.” And in de Certeau’s The Possession of Loudun, this foxlike dance moves to the stage, as an improv chorus that disrupts the events at Loudon when reimagined as a tetralogy of plays at City Dionysia. More precisely, Loudun’s tetralogy could be interpreted as a series of three tragedies and one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Ethical and Unethical Bargaining Tactics: An Empirical Study.Roy J. Lewicki & Robert J. Robinson - 1998 - Journal of Business Ethics 17 (6):665-682.
    Competitive negotiators frequently use tactics which others view as "unethical", in that these tactics either violate standards of truth telling or violate the perceived rules of negotiation. This paper sought to determine how business students viewed a number of marginally ethical negotiating tactics, and to determine the underlying factor structure of these tactics. The factor analysis of these tactics revealed five clear factors which were highly similar across the two samples, and which parallel (to a (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  29. “Shock tactics”, ethics, and fear. An academic and personal perspective on the case against ECT.Tania Gergel - forthcoming - British Journal of Psychiatry.
    Despite extensive evidence for its effectiveness, ECT remains the subject of fierce opposition from those contesting its benefits and claiming extreme harms. Alongside some reflections on my experiences of this treatment, I examine the case against ECT, and find that it appears to rest primarily on unsubstantiated claims about major ethical violations, rather than clinical factors such as effectiveness and risk.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Addressing research integrity challenges: from penalising individual perpetrators to fostering research ecosystem quality care.Ruud Meulen & Hub Zwart - 2019 - Life Sciences, Society and Policy 15 (1):1-5.
    Concern for and interest in research integrity has increased significantly during recent decades, both in academic and in policy discourse. Both in terms of diagnostics and in terms of therapy, the tendency in integrity discourse has been to focus on strategies of individualisation (detecting and punishing individual deviance). Other contributions to the integrity debate, however, focus more explicitly on environmental factors, e.g. on the quality and resilience of research ecosystems, on institutional rather than individual responsibilities, and on the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  31. Working with Research Integrity—Guidance for Research Performing Organisations: The Bonn PRINTEGER Statement.Mira Zöller, Hub Zwart, Knut Vie, Krista Varantola, Marta Tazewell, Margit Sutrop, Thomas Saretzki, Sarah Rijcke, Barend Meulen, Inge Lerouge, Matthias Kaiser, Jacques Janssen, Ingrid Jacobsen, Serge Horbach, Bert Heinrichs, Gloria Fuster, Carlo Casonato, Henriette Bout, Giles Birchley, Sharon Bailey, Frank Anthun & Ellen-Marie Forsberg - 2018 - Science and Engineering Ethics 24 (4):1023-1034.
    This document presents the Bonn PRINTEGER Consensus Statement: Working with Research Integrity—Guidance for research performing organisations. The aim of the statement is to complement existing instruments by focusing specifically on institutional responsibilities for strengthening integrity. It takes into account the daily challenges and organisational contexts of most researchers. The statement intends to make research integrity challenges recognisable from the work-floor perspective, providing concrete advice on organisational measures to strengthen integrity. The statement, which was concluded February 7th 2018, (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  32. Leadership Strategy and Tactics: Field Manual. [REVIEW]Steven Umbrello - 2021 - Journal of Military Ethics 20 (1):82-83.
    A new book by Jocko Willink, "Leadership Strategy and Tactics: Field Manual", is reviewed. Leadership Strategy and Tactics explore the nature of leadership styles and strategies in both narrative forms as the author discusses past experiences in the military, as well as in real-world applications beyond the military domain. The author provides timely, yet timeless advice for aspiring leaders in an easily digestible form, with quick reference chapters and simple tactical points.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Empirical Research and Normative Theory – Transdisciplinary Perspectives on Two Methodical Traditions Between Separation and Interdependence.Alexander Max Bauer & Malte Meyerhuber (eds.) - 2019 - Berlin and Boston: Walter de Gruyter.
    Two questions often shape our view of the world. On the one hand, we ask what there is, on the other hand, we ask what there ought to be. Empirical research and normative theory, the methodological traditions concerned with these questions, entered a difficult relationship, from at least as early as around the time of the advent of modern sciences. To this day, there remains a strong separation between the two domains, with both tending to neglect discourses and results (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Shalom on the Impermissibility of Self-Defense against the Tactical Bomber.Uwe Steinhoff - manuscript
    A standard example of a justified aggressor is the tactical bomber who is about to destroy an ammunitions factory in a proportionate, justified military attack, full well knowing that an innocent civilian bystander will also be killed by his attack (“collateral damage”). Intuitively it seems hard to believe that the innocent bystander threatened by the tactical bomber is morally prohibited from killing him in self-defense. Yet, Stephen R. Shalom indeed endorses such a prohibition. I shall argue that all the examples (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Clinical research: Should patients pay to play?Ezekiel J. Emanuel, Steven Joffe, Christine Grady, David Wendler & Govind Persad - 2015 - Science Translational Medicine 7 (298):298ps16.
    We argue that charging people to participate in research is likely to undermine the fundamental ethical bases of clinical research, especially the principles of social value, scientific validity, and fair subject selection.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. The Birth of a Research Animal: Ibsen's The Wild Duck and the Origin of a New Animal Science.H. A. E. Zwart - 2000 - Environmental Values 9 (1):91-108.
    What role does the wild duck play in Ibsen's famous drama? I argue that, besides mirroring the fate of the human cast members, the duck is acting as animal subject in a quasi-experiment, conducted in a private setting. Analysed from this perspective, the play allows us to discern the epistemological and ethical dimensions of the new scientific animal practice (systematic observation of animal behaviour under artificial conditions) emerging precesely at that time. Ibsen's play stages the clash between a scientific and (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Animal Research that Respects Animal Rights: Extending Requirements for Research with Humans to Animals.Angela K. Martin - 2022 - Cambridge Quarterly of Healthcare Ethics 31 (1):59-72.
    The purpose of this article is to show that animal rights are not necessarily at odds with the use of animals for research. If animals hold basic moral rights similar to those of humans, then we should consequently extend the ethical requirements guiding research with humans to research with animals. The article spells out how this can be done in practice by applying the seven requirements for ethical research with humans proposed by Ezekiel Emanuel, David Wendler (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  38. Research integrity codes of conduct in Europe: Understanding the divergences.Hugh Desmond & Kris Dierickx - 2021 - Bioethics 35 (5):414-428.
    In the past decade, policy-makers in science have been concerned with harmonizing research integrity standards across Europe. These standards are encapsulated in the European Code of Conduct for Research Integrity. Yet, almost every European country today has its own national-level code of conduct for research integrity. In this study we document in detail how national-level codes diverge on almost all aspects concerning research integrity – except for what constitutes egregious misconduct. Besides allowing for potentially unfair responses (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  39. Research participants’ perceptions and views on consent for biobank research: a review of empirical data and ethical analysis.Flavio D’Abramo, Jan Schildmann & Jochen Vollmann - 2015 - BMC Medical Ethics 16 (1):60.
    Appropriate information and consent has been one of the most intensely discussed topics within the context of biobank research. In parallel to the normative debate, many socio-empirical studies have been conducted to gather experiences, preferences and views of patients, healthy research participants and further stakeholders. However, there is scarcity of literature which connects the normative debate about justifications for different consent models with findings gained in empirical research. In this paper we discuss findings of a limited review (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  40. Research Funding and the Value-Dependence of Science.Wade L. Robison - 1992 - Business and Professional Ethics Journal 11 (1):33-50.
    An understanding of the ethical problems that have arisen in the funding of scientific research at universities requires some attention to doctrines that have traditionally been held about science itself. Such doctrines, we hope to show, are themselves central to many of these ethical problems. It is often thought that the questions examined by scientists, and the theories that guide scientific research, are chosen for uniquely scientific reasons, independently of extra-scientific questions of value or merit. We shall argue (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Research by Design at the Crossroads of Architecture and Visual Arts: Exploring the Epistemological Reconfigurations.Marianna Charitonidou - 2024 - In Michela Barosio, Elena Vigliocco & Santiago Gomes, School of Architecture(s) - New Frontiers of Architectural Education. Cham: Springer. pp. 219-231.
    Thepaperaimstoexplorethepotentialofresearchbydesigninarchi- tecture and visual arts. The main objective of the paper is to analyze the different models and epistemological positions advanced in the academic milieus as far as doctoral research by design is concerned, to explore the differences and similar- ities between research by design in the field of architecture and in the field of visual arts. Even though the research by design in the fields of architecture and visual arts is focused on the production of knowledge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Research on the topics of neutrosophic operations research. Volume 1.Florentin Smarandache & Maissam Ahmad Jdid - 2023
    In this volume, we present a set of research that was published in cooperation with a number of researchers and those interested in keeping pace with the great scientific development that our contemporary world is witnessing, and one of its products was neutrosophic science, which was founded by the American scientist and mathematical philosopher Florentin Smarandache in 1995. Through it, we present a new vision for some research methods. Operations research to the concepts of this science.
    Download  
     
    Export citation  
     
    Bookmark  
  43. Addressing research integrity challenges: from penalising individual perpetrators to fostering research ecosystem quality care.Hub Zwart & Ruud ter Meulen - 2019 - Life Sciences, Society and Policy 15 (1):1-5.
    Concern for and interest in research integrity has increased significantly during recent decades, both in academic and in policy discourse. Both in terms of diagnostics and in terms of therapy, the tendency in integrity discourse has been to focus on strategies of individualisation. Other contributions to the integrity debate, however, focus more explicitly on environmental factors, e.g. on the quality and resilience of research ecosystems, on institutional rather than individual responsibilities, and on the quality of the research (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  44. Research Self-Efficacy and Productivity of Select Faculty Members: Inferences for Faculty Development Plan.Jupeth Pentang & Jaynelle Domingo - 2024 - European Journal of Educational Research 13 (4):1693-1709.
    Faculty members’ beliefs in their ability to conduct research and publish research outputs are expected to impact research productivity directly. Thus, the study described the research self-efficacy and productivity among faculty members, their research self-efficacy influence on productivity, and their challenges in research writing and publication. The study utilized a mixed-method sequential explanatory research design, with 36 and nine faculty member-participants for the quantitative and qualitative study. For the quantitative study, the faculty members’ (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  45. Researchers who lead the trends.Xuan-Hung Doan, Phuong-Tram T. Nguyen, Viet-Phuong La & Hong-Kong T. Nguyen - 2019 - In Quan-Hoang Vuong & Trung Tran, The Vietnamese Social Sciences at a Fork in the Road. Warsaw, Poland: De Gruyter. pp. 98-120.
    Xuan-Hung Doan, Phuong-Tram T. Nguyen, Viet-Phuong La, Hong-Kong T. Nguyen (2019). Chapter 5. Researchers who lead the trends. In Quan-Hoang Vuong, Trung Tran (Eds.), The Vietnamese Social Sciences at a Fork in the Road (pp. 98–120). Warsaw, Poland: De Gruyter. DOI:10.2478/9783110686081-010 -/- Online ISBN: 9783110686081 © 2019 Sciendo.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  67
    Epistemological Crisis and Tactics of Psychoanalytics.Morteza Shahram - manuscript
    According to Freud: the business of the analysis is to secure the best possible psychological conditions for the functions of the ego. Functional interpretation rather than veridical reconstruction of past events. Truth in an interpretation is the proximity to the apotheotic resilience of the resilience of the ego undertaking the interpretation in the face of emerging contingencies. If apotheosis implicates the critical functionality of the interpretation, then the apotheosis is the resoluteness that defies future evidence undermining the interpretation. The critical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Solution to Poor Opinions is More Opinions: Peircean Pragmatist Tactics for the Epistemic Long Game.Catherine Legg - 2018 - In Michael Peters, Sharon Rider, Tina Besley & Mats Hyvonen, Post-Truth, Fake News: Viral Modernity & Higher Education. Springer. pp. 43-58.
    Although certain recent developments in mendacious political manipulation of public discourse are horrifying to the academic mind, I argue that we should not panic. Charles Peirce’s pragmatist epistemology with its teleological arc, long horizon, and rare balance between robust realism and contrite fallibilism offers guidance to weather the storm, and perhaps even see it as inevitable in our intellectual development. This paper explores Peirce’s classic “four methods of fixing belief”, which takes us on an entertaining and still very pertinent tour (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Enhancing Research on Academicians in Cambodian Higher Education: A Policy Perspective.Rany Sam, Morin Tieng, Hak Yoeng, Sarith Chiv, Mardy Serey & Sopheak Sam - manuscript
    Cambodia's higher education institutions (HEIs) face a number of challenges. Academics require increased access to resources and funding, as well as restrictions on academic freedom and significant language and cultural barriers. The purpose of this chapter is to identify and analyze the individual factors influencing academicians' research productivity in Cambodian higher education institutions, to examine and evaluate the impact of institutional factors on research productivity, to investigate and assess the external factors affecting research productivity, and to develop (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Research Competence of Out-of-Field Teachers in Teaching Practical Research: Input to Capability Building Series.Orville J. Evardo Jr & Ivy Lyt Abina - 2023 - International Journal for Multidisciplinary Research 6 (5).
    Research is a high-level course for the 21st century learners thus requiring highly qualified teachers that are proficient both in research and teaching. This study utilizes convergent parallel design, a mixed method approach to describe the research competence and to design a Capability Building Series Program. The respondents of this study are the out-of-field research teachers from selected private Senior High Schools. There are 40 respondents for the quantitative phase while 14 participants in the qualitative phase. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  99
    Collaborative research, scientific communities, and the social diffusion of trustworthiness.Torsten Wilholt - 2016 - In Michael Brady & Miranda Fricker, The Epistemic Life of Groups: Essays in the Epistemology of Collectives. Oxford, United Kingdom: Oxford University Press UK.
    The main thesis of this paper is that when we trust the results of scientific research, that trust is inevitably directed at least in part at collective bodies rather than at single researchers, and that accordingly, reasonable assessments of epistemic trustworthiness in science must attend to these collective bodies. In order to support this claim, I start by invoking the collaborative nature of most of today’s scientific research. I argue that the trustworthiness of a collaborative research group (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 970