Self-Studies Exploring Participants’ Underlying Assumptions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Underlying assumptions of developmental models.

These 10 obvious propositions make a model of the specification of form, intended to expose underlying assumptions of developmental biology for examination and future experimentation. (I) The control of development is by means of local interactions, rather than global control mechanisms. (II) A macromolecule near a specific site will bind by mass action. (III) Starting with a precursor cell, al...

متن کامل

Exploring the assumptions underlying information systems methodologies: Their impact on past, present and future ISM research

Assumptions about an object under study can influence research in many ways. These preconceptions color the researcher's perspective, and influence the research purpose, the research questions addressed, and the research methods used. This paper identifies and analyzes the following assumptions regarding information systems methodology (ISM) research: the positive impact of methodologies on the...

متن کامل

Assumptions Underlying Agile Software Development Processes

Agile processes focus on facilitating early and fast production of working code, and are based on software development process models that support iterative, incremental development of software. Although agile methods have existed for a number of years now, answers to questions concerning the suitability of agile processes to particular software development environments are still often based on...

متن کامل

Underlying Assumptions and Designated Verifier Signatures

In this paper, we define an underlying computational problem and its decisional problem. As an application of their problems, we propose an efficient designated verifier signature (DVS) scheme without random oracles (related to symmetric pairings). We formally redefine the (Strong) Privacy of Signature’s Identity, and prove our DVS scheme satisfying security based on the difficulty of the probl...

متن کامل

Analysis of Underlying Assumptions in NIST DRBGs

In [1], four different DRBGs are recommended for cryptographic purpose. Each generator is based on some underlying cryptographic concept. The article examines each of the concept to determine what are the necessary and sufficient conditions for the DRBG to be secured in its generation process. In addition, the effects of failure of typical cryptographic requirements of each underlying concept a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Studying Teacher Education

سال: 2016

ISSN: 1742-5964,1742-5972

DOI: 10.1080/17425964.2016.1153354