Self-Studies Exploring Participants’ Underlying Assumptions
نویسندگان
چکیده
منابع مشابه
Underlying assumptions of developmental models.
These 10 obvious propositions make a model of the specification of form, intended to expose underlying assumptions of developmental biology for examination and future experimentation. (I) The control of development is by means of local interactions, rather than global control mechanisms. (II) A macromolecule near a specific site will bind by mass action. (III) Starting with a precursor cell, al...
متن کاملExploring the assumptions underlying information systems methodologies: Their impact on past, present and future ISM research
Assumptions about an object under study can influence research in many ways. These preconceptions color the researcher's perspective, and influence the research purpose, the research questions addressed, and the research methods used. This paper identifies and analyzes the following assumptions regarding information systems methodology (ISM) research: the positive impact of methodologies on the...
متن کاملAssumptions Underlying Agile Software Development Processes
Agile processes focus on facilitating early and fast production of working code, and are based on software development process models that support iterative, incremental development of software. Although agile methods have existed for a number of years now, answers to questions concerning the suitability of agile processes to particular software development environments are still often based on...
متن کاملUnderlying Assumptions and Designated Verifier Signatures
In this paper, we define an underlying computational problem and its decisional problem. As an application of their problems, we propose an efficient designated verifier signature (DVS) scheme without random oracles (related to symmetric pairings). We formally redefine the (Strong) Privacy of Signature’s Identity, and prove our DVS scheme satisfying security based on the difficulty of the probl...
متن کاملAnalysis of Underlying Assumptions in NIST DRBGs
In [1], four different DRBGs are recommended for cryptographic purpose. Each generator is based on some underlying cryptographic concept. The article examines each of the concept to determine what are the necessary and sufficient conditions for the DRBG to be secured in its generation process. In addition, the effects of failure of typical cryptographic requirements of each underlying concept a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Studying Teacher Education
سال: 2016
ISSN: 1742-5964,1742-5972
DOI: 10.1080/17425964.2016.1153354