Results for 'Lisp Source Code'

975 found
Order:
  1. The Limits of Mathematics.Lisp Source Code - unknown
    In a remarkable development, I have constructed a new definition for a self-delimiting universal Turing machine (UTM) that is easy to program and runs very quickly. This provides a new foundation for algorithmic information theory (AIT), which is the theory of the size in bits of programs for selfdelimiting UTM's. Previously, AIT had an abstract mathematical quality. Now it is possible to write down executable programs that embody the constructions in the proofs of theorems. So AIT goes from dealing with (...)
     
    Export citation  
     
    Bookmark   2 citations  
  2. Source code's video game logic.Warren Buckland - 2014 - In Hollywood puzzle films. New York: Routledge.
     
    Export citation  
     
    Bookmark  
  3.  63
    Ethical Sourcing Codes of Large UK-Based Corporations: Prevalence, Content, Limitations.Lutz Preuss - 2009 - Journal of Business Ethics 88 (4):735-747.
    Codes of conduct have become the perhaps most often used tool to manage corporate social responsibility (CSR). Researchers have primarily analysed such documents at company-wide or trans-company levels, whereas there is a dearth of studies into the use of codes for particular corporate functions. Hence, this article will examine one particular group of sub-company level codes, namely codes of conduct that stipulate CSR criteria for suppliers. Examining such ethical sourcing policies adopted by the FTSE100 corporations, the article draws out what (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  4.  8
    Source code obfuscation with genetic algorithms using LLVM code optimizations.Juan Carlos de la Torre, Javier Jareño, José Miguel Aragón-Jurado, Sébastien Varrette & Bernabé Dorronsoro - forthcoming - Logic Journal of the IGPL.
    With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems. If novel paradigm as confidential computing aims at protecting the data manipulated during the execution, obfuscating techniques (in particular at the source code level) remain a popular solution to conceal the purpose of a program or its logic without altering its functionality, thus (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  41
    Free, source-code-available, or proprietary: an ethically charged, context-sensitive choice.Marty J. Wolf, Keith W. Miller & Frances S. Grodzinsky - 2009 - Acm Sigcas Computers and Society 39 (1):15-26.
    We demonstrate that different categories of software raise different ethical concerns with respect to whether software ought to be Free Software or Proprietary Software. We outline the ethical tension between Free Software and Proprietary Software that stems from the two kinds of licenses. For some categories of software we develop support for normative statements regarding the software development landscape. We claim that as society's use of software changes, the ethical analysis for that category of software must necessarily be repeated. Finally, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  55
    Commentary on "Loopholes, Gaps, and What is Held Fast".Lorraine Code - 1996 - Philosophy, Psychiatry, and Psychology 3 (4):255-260.
    In lieu of an abstract, here is a brief excerpt of the content:Commentary on “Loopholes, Gaps, and What Is Held Fast”Lorraine Code (bio)Keywordsepistemology, incredulity, knowing other people, memory, testimonyNancy Potter’s compelling essay points to some of the limitations of the theoretical apparatus that the post-positivist empiricist epistemologies of the Anglo-American mainstream make available for evaluating experiential memory claims in general, and “false memory syndrome” in particular. The loopholes and gaps in these theories of knowledge push urgent questions about testimony, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7. Aristotle’s Investigation of a Basic Logical Principle.Alan Code - 1986 - Canadian Journal of Philosophy 16 (3):341-357.
    Aristotle shares with Plato the attitude that the world, ‘the all,’ is a kosmos, a well-ordered and beautiful whole which, as such, can be rendered intelligible, or understood, by the intellect. One understands things, generally speaking, by tracing them back to their sources, origins or principles and causes or explanatory factors, and seeing in what manner they are related to these principles. We know, or understand, a thing when we grasp ‘the why’ or cause. Consequently, understanding is systematic. Some things (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  8.  22
    Lacan’s Cybernetic Theory of Causality: Repetition and the Unconscious in Duncan Jones’ Source Code.Colin Wright - 2018 - In Svitlana Matviyenko & Judith Roof, Lacan and the Posthuman. Cham: Springer Verlag. pp. 67-88.
    Wright’s chapter outlines how Lacan’s early engagement with cybernetics and game theory informed his psychoanalytic theory of causality. At times, Lacan seems close to a posthumanism avant la lettre in his emphasis on the machinic or combinatorial aspects of the psyche. However, through a Lacanian interpretation of Duncan Jones’ Sci-fi film Source Code —in which the main character’s cyborg status allows for an exploration of posthuman themes—Wright argues that Lacan stresses the temporality of desire and the act in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. Modular spacetime in the "intelligent" blockbuster: Inception and Source code.Allan Cameron & Richard Misek - 2014 - In Warren Buckland, Hollywood puzzle films. New York: Routledge.
     
    Export citation  
     
    Bookmark  
  10.  6
    Multiple Desirable Methods in Outlier Detection of Univariate Data With R Source Codes.Yuho Shimizu - 2022 - Frontiers in Psychology 12.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  10
    A source- and channel-coding approach to the analysis and design of languages and ideographies.Mihnea Moldoveanu - 2023 - Behavioral and Brain Sciences 46:e248.
    Can we explain the advantage natural languages enjoy over ideographies in a way that enables us to attempt the design of an ideography that “works”? I deploy an adapted version of Shannon's source- and channel-coding partitioning of a communication system to explain the communicative dynamics and shortfalls of ideographies, and reveal ways in which entrenchable, generalist ideographies could be designed.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  82
    Predictive coding? Yes, but from what source?Gregory Hickok - 2013 - Behavioral and Brain Sciences 36 (4):358-358.
    There is little doubt that predictive coding is an important mechanism in language processing–indeed, in information processing generally. However, it is less clear whether the action system is the source of such predictions during perception. Here I summarize the computational problem with motor prediction for perceptual processes and argue instead for a dual-stream model of predictive coding.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  7
    Coding theorems of information theory.Jacob Wolfowitz - 1961 - Englewood Cliffs, N.J.,: Prentice-Hall.
    The objective of the present edition of this monograph is the same as that of earlier editions, namely, to provide readers with some mathemati cal maturity a rigorous and modern introduction to the ideas and principal theorems of probabilistic information theory. It is not necessary that readers have any prior knowledge whatever of information theory. The rapid development of the subject has had the consequence that any one book can now cover only a fraction of the literature. The latter is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  18
    MSDIP: A Method for Coding Source Domains in Metaphor Analysis.W. Gudrun Reijnierse & Christian Burgers - 2023 - Metaphor and Symbol 38 (4):295-310.
    This article describes the Metaphorical Source Domain Identification Procedure (MSDIP), which can be used to code source domains in metaphor identification. In the first part of the article, we describe the complexity of source-domain coding in corpus analysis. We argue that, in many cases, discourse is underspecified and multiple source-domain candidates may be relevant for a specific metaphorical expression. For instance, if a word like “fight” or “target” is used metaphorically, it could refer to either (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  26
    The healing code: 6 minutes to heal the source of any health, success or relationship issue.Alex Loyd - 2010 - Peoria, Ariz.: Intermedia Publishing Group. Edited by Ben Johnson & Jordan Rubin.
    Discover the revolutionary formula that heals the source of illness and disease, even success and relationship issues. Dr. Alex Loyd discovered how to activate a physical function built into the body that consistently and predictably removes this source so that the neuro-immune system takes over its job of healing whatever is wrong in the body. His findings were validated scientifically and by the thousands of people from all over the world who have used The Healing Codes. In this (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  23
    Open Genetic Code: on open source in the life sciences.Eric Deibel - 2014 - Life Sciences, Society and Policy 10 (1):1-23.
    The introduction of open source in the life sciences is increasingly being suggested as an alternative to patenting. This is an alternative, however, that takes its shape at the intersection of the life sciences and informatics. Numerous examples can be identified wherein open source in the life sciences refers to access, sharing and collaboration as informatic practices. This includes open source as an experimental model and as a more sophisticated approach of genetic engineering. The first section discusses (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  22
    Do Programmers Prefer Predictable Expressions in Code?Casey Casalnuovo, Kevin Lee, Hulin Wang, Prem Devanbu & Emily Morgan - 2020 - Cognitive Science 44 (12):e12921.
    Source code is a form of human communication, albeit one where the information shared between the programmers reading and writing the code is constrained by the requirement that the code executes correctly. Programming languages are more syntactically constrained than natural languages, but they are also very expressive, allowing a great many different ways to express even very simple computations. Still, code written by developers is highly predictable, and many programming tools have taken advantage of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  18
    Coding Freedom: The Ethics and Aesthetics of Hacking.E. Gabriella Coleman - 2012 - Princeton University Press.
    Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software movement in the United States and Europe, Coding Freedom details the ethics behind hackers' devotion to F/OSS, the social codes that guide its production, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  19.  44
    Code as speech: A discussion of Bernstein V. USDOJ, karn V. USDOS, and junger V. Daley in light of the U.s. Supreme court's recent shift to federalism. [REVIEW]Jean Camp & K. Lewis - 2001 - Ethics and Information Technology 3 (1):21-33.
    The purpose of this paper is to address the question of whethercomputer source code is speech protected by the First Amendmentto the United States Constitution or whether it is merelyfunctional, a ``machine'', designed to fulfill a set task andtherefore bereft of protection. The answer to this question is acomplex one. Unlike all other forms of ``speech'' computer sourcecode holds a unique place in the law: it can be copyrighted, likea book and it can be patented like a machine (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  20. The Idea of Code in Contextualism and Minimalism.Jakub Mácha - 2012 - Organon F: Medzinárodný Časopis Pre Analytickú Filozofiu 19 (suppl. 1):116-136.
    In this paper I discuss the idea of a semantic code in the contemporary debate between contextualism and minimalism. First, I identify historical sources of these positions in Grice’s pragmatics and in Davidson’s theory of meaning in order to sketch the role of a semantic code there. Then I argue that contextualism is committed to the idea of an ad hoc code, while minimalism involves a persistent code. However, the latter approach to a code requires (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  76
    The impact of ethics code familiarity on manager behavior.Thomas R. Wotruba, Lawrence B. Chonko & Terry W. Loe - 2000 - Journal of Business Ethics 33 (1):59 - 69.
    Codes of ethics exist in many, if not the majority, of all large U.S. companies today. But how the impact of these written codes affect managerial attitudes and behavior is still not clearly documented or explained. This study takes a step in that direction by proposing that attention should shift from the codes themselves as the sources of ethical behavior to the persons whose behavior is the focus of these codes. In particular, this study investigates the role of code (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   54 citations  
  22.  6
    Journalistic codes of ethics in the CSCE countries: an examination.Pauli Juusela - 1991 - Tampere: University of Tampere, Dept. of Journalism and Mass Communication.
    A study examined the journalistic codes of ethics from 23 countries involved in the Conference on Security and Cooperation in Europe (CSCE), using descriptive and interpretative content analysis. The contents of the 24 codes from the 23 countries were divided into explicit categories on the basis of a 17-part classification scheme, including: "truth, ""acquisition of facts, ""professional secrecy, ""freedom of information, ""professional integrity, ""human rights," and "values." Results indicated that: (1) the most important principle in all the codes was represented (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  27
    Processing of snoRNAs as a new source of regulatory non‐coding RNAs.Marina Falaleeva & Stefan Stamm - 2013 - Bioessays 35 (1):46-54.
    Recent experimental evidence suggests that most of the genome is transcribed into non‐coding RNAs. The initial transcripts undergo further processing generating shorter, metabolically stable RNAs with diverse functions. Small nucleolar RNAs (snoRNAs) are non‐coding RNAs that modify rRNAs, tRNAs, and snRNAs that were considered stable. We review evidence that snoRNAs undergo further processing. High‐throughput sequencing and RNase protection experiments showed widespread expression of snoRNA fragments, known as snoRNA‐derived RNAs (sdRNAs). Some sdRNAs resemble miRNAs, these can associate with argonaute proteins and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  24.  71
    Ethical codes in the digital world: Comparisons of the proprietary, the open/free and the cracker system. [REVIEW]Jukka Vuorinen - 2007 - Ethics and Information Technology 9 (1):27-38.
    The digital world provides various ethical frames for individuals to become ethical subjects. In this paper I examine – in a Foucauldian and Luhmannian way – the differences between three systems of communication: the proprietary, the open/free and the cracker system. It is argued that all three systems provide a different set of ethical codes which one can be subjected to. The language of each system is restricted and they cannot understand each other, they merely consider each other as the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  59
    Ethical Codes in Sports Organizations: Classification Framework, Content Analysis, and the Influence of Content on Code Effectiveness.Els De Waegeneer, Jeroen Van De Sompele & Annick Willem - 2016 - Journal of Business Ethics 136 (3):587-598.
    Sports organizations face various ethical challenges. To tackle these, ethical codes are becoming increasingly popular instruments. However, a lot of questions remain concerning their effectiveness. There is a particular lack of knowledge when it comes to their form and content, and on the influence of these features on the effectiveness of these codes of ethics. Therefore, we developed a framework to analyze ethical codes and used this to assess codes of ethics in sports clubs from six disciplines. The form and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26.  71
    Open Sourcing Normative Assumptions on Privacy and Other Moral Values in Blockchain Applications.Georgy Ishmaev - 2019 - Dissertation, Delft University of Technology
    The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such technological determinism, however, hardly provides insights of sufficient depth on the moral significance of blockchain technology. This thesis argues rather, that very much like the cryptographic tools before them, blockchains develop in a (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Supply Chain Specific? Understanding the Patchy Success of Ethical Sourcing Initiatives.Sarah Roberts - 2003 - Journal of Business Ethics 44 (2/3):159 - 170.
    As a number of high profile companies have found to their cost, corporate reputations can be significantly affected by firms' management of sustainability issue, including those that are outside their direct control, such as the environmental and social impacts of their supply networks. This paper begins by examining the relationship between corporate social responsibility, reputation, and supply network conditions. It then looks at the effectiveness of one tool for managing supply network sustainability issues, ethical sourcing codes of conduct, by examining (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   63 citations  
  28.  15
    Universal coding and prediction on ergodic random points.Łukasz Dębowski & Tomasz Steifer - 2022 - Bulletin of Symbolic Logic 28 (3):387-412.
    Suppose that we have a method which estimates the conditional probabilities of some unknown stochastic source and we use it to guess which of the outcomes will happen. We want to make a correct guess as often as it is possible. What estimators are good for this? In this work, we consider estimators given by a familiar notion of universal coding for stationary ergodic measures, while working in the framework of algorithmic randomness, i.e., we are particularly interested in prediction (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  16
    Code, coding and coded perspectives.L. Jean Camp - 2003 - Journal of Information, Communication and Ethics in Society 1 (1):49-60.
    I begin with a discussion of code and its primary types: embedded, source, binary and interpreted. I then consider three measures in which code is fundamentally different than print. In particular I speak of the trust inherent in connectivity, the organizational difficulties of information, and the problem of archiving information that may change rapidly. Following each of these explanations I offer my own hypotheses about how code and ubiquitous digital media might alter society and the sensibilities (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30.  21
    The future of ppen source software: Let the market decide.R. A. Spinello - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):217-233.
    According to its supporters open source software is more secure and reliable than proprietary code, and even tends to foster more innovation. Its technical superiority can be linked to the ongoing peer review process which typifies the open source model. In addition, programs such as Linux offer a potential challenge to the hegemony of Microsoft. Open source holds out the possibility of restraining platform leaders such as Microsoft from acting opportunistically. Some even argue that the open (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  87
    Ethical Codes in Sports Organizations: Classification Framework, Content Analysis, and the Influence of Content on Code Effectiveness.Annick Willem, Jeroen Sompele & Els Waegeneer - 2016 - Journal of Business Ethics 136 (3):587-598.
    Sports organizations face various ethical challenges. To tackle these, ethical codes are becoming increasingly popular instruments. However, a lot of questions remain concerning their effectiveness. There is a particular lack of knowledge when it comes to their form and content, and on the influence of these features on the effectiveness of these codes of ethics. Therefore, we developed a framework to analyze ethical codes and used this to assess codes of ethics in sports clubs from six disciplines. The form and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. ‘Genetic Coding’ Reconsidered : An Analysis of Actual Usage.Ulrich E. Stegmann - 2016 - British Journal for the Philosophy of Science 67 (3):707-730.
    This article reconsiders the theoretical role of the genetic code. By drawing on published and unpublished sources from the 1950s, I analyse how the code metaphor was actually employed by the scientists who first promoted its use. The analysis shows that the term ‘code’ picked out mechanism sketches, consisting of more or less detailed descriptions of ordinary molecular components, processes, and structural properties of the mechanism of protein synthesis. The sketches provided how-possibly explanations for the ordering of (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  33.  44
    Harnessing Multidimensional Legitimacy for Codes of Ethics: A Staged Approach.Hugh Breakey - 2019 - Journal of Business Ethics 170 (2):359-373.
    How can codes of ethics acquire legitimacy—that is, how can they lay down obligations that will be seen by their subjects as morally binding? There are many answers to this question, reflecting the fact that moral agents have a host of different bases on which they may acknowledge code duties as ethically binding—or, alternatively, may reject those duties as morally irrelevant or actively corrupt. Drawing on a wide literature on legitimacy in other practical fields, this paper develops a multidimensional (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  96
    The effectiveness of corporate codes of ethics.Steven Weller - 1988 - Journal of Business Ethics 7 (5):389 - 395.
    While the focus on business ethics is increasing in business school curricula, there has been little systematic scholarly research on the forces which bring about ethical behavior. This article is intended as a first step toward that research by creating a catalogue of hypotheses concerning the efficacy of corporate codes of ethics. The hypotheses are drawn from studies of compliance with law and court decisions and theories of legitimacy, authority, public policy making and individual behavior. Hypotheses are proposed based on (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  35. A Kantian approach to codes of ethics.Jacquie L'Etang - 1992 - Journal of Business Ethics 11 (10):737 - 744.
    The paper discusses whether codes of ethics are Kantian notions through an analysis of their intention and structure. The article also discusses some of the ideas put forward by William Starr in his article, Codes of Ethics — Towards a Rule-Utilitarian Justification,Journal of Business Ethics 2(2) (May 1983).The paper refers to recent definitions of codes of ethics and considers reasons for the proliferation of such codes. It examines the moral justification for these codes and analyses the underlying ethical theory particularly (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  36.  24
    An ethical code for collecting, using and transferring sensitive health data: outcomes of a modified Policy Delphi process in Singapore.Bernadette Richards, Hui Jin Toh, James Scheibner, Hui Yun Chan & Tamra Lysaght - 2023 - BMC Medical Ethics 24 (1):1-14.
    One of the core goals of Digital Health Technologies (DHT) is to transform healthcare services and delivery by shifting primary care from hospitals into the community. However, achieving this goal will rely on the collection, use and storage of large datasets. Some of these datasets will be linked to multiple sources, and may include highly sensitive health information that needs to be transferred across institutional and jurisdictional boundaries. The growth of DHT has outpaced the establishment of clear legal pathways to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  20
    An Open-Source Cognitive Test Battery to Assess Human Attention and Memory.Maxime Adolphe, Masataka Sawayama, Denis Maurel, Alexandra Delmas, Pierre-Yves Oudeyer & Hélène Sauzéon - 2022 - Frontiers in Psychology 13.
    Cognitive test batteries are widely used in diverse research fields, such as cognitive training, cognitive disorder assessment, or brain mechanism understanding. Although they need flexibility according to their usage objectives, most test batteries are not available as open-source software and are not be tuned by researchers in detail. The present study introduces an open-source cognitive test battery to assess attention and memory, using a javascript library, p5.js. Because of the ubiquitous nature of dynamic attention in our daily lives, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  43
    Professional law enforcement codes: a documentary collection.John Kleinig & Yurong Zhang (eds.) - 1993 - Westport, Conn.: Greenwood Press.
    This volume fills that gap and offers teachers in criminal justice ethics and law enforcement practitioners a rich selection of materials that have emerged in ...
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. The Non-Coding RNA Ontology : a comprehensive resource for the unification of non-coding RNA biology.Huang Jingshan, Eilbeck Karen, Barry Smith, A. Blake Judith, Dou Dejing, Huang Weili, A. Natale Darren, Ruttenberg Alan, Huan Jun & T. Zimmermann Michael - 2016 - Journal of Biomedical Semantics 7 (1).
    In recent years, sequencing technologies have enabled the identification of a wide range of non-coding RNAs (ncRNAs). Unfortunately, annotation and integration of ncRNA data has lagged behind their identification. Given the large quantity of information being obtained in this area, there emerges an urgent need to integrate what is being discovered by a broad range of relevant communities. To this end, the Non-Coding RNA Ontology (NCRO) is being developed to provide a systematically structured and precisely defined controlled vocabulary for the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. Disclosure of terminal illness to patients and families: diversity of governing codes in 14 Islamic countries.H. E. Abdulhameed, M. M. Hammami & E. A. Hameed Mohamed - 2011 - Journal of Medical Ethics 37 (8):472-475.
    Background The consistency of codes governing disclosure of terminal illness to patients and families in Islamic countries has not been studied until now. Objectives To review available codes on disclosure of terminal illness in Islamic countries. Data source and extraction Data were extracted through searches on Google and PubMed. Codes related to disclosure of terminal illness to patients or families were abstracted, and then classified independently by the three authors. Data synthesis Codes for 14 Islamic countries were located. Five (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  41. Universal Moral Values for Corporate Codes of Ethics.Mark S. Schwartz - 2005 - Journal of Business Ethics 59 (1-2):27-44.
    How can one establish if a corporate code of ethics is ethical in terms of its content? One important first step might be the establishment of core universal moral values by which corporate codes of ethics can be ethically constructed and evaluated. Following a review of normative research on corporate codes of ethics, a set of universal moral values is generated by considering three sources: (1) corporate codes of ethics; (2) global codes of ethics; and (3) the business ethics (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   69 citations  
  42.  15
    Code Red for Humanity: Multimodal Metaphor and Metonymy in Noncommercial Advertisements on Environmental Awareness and Activism.Laura Hidalgo-Downing & Niamh A. O’Dowd - 2023 - Metaphor and Symbol 38 (3):231-253.
    Concern for global warming, climate change and pollution has grown in recent years, with countries across the world facing natural disasters on unprecedented scales. The communication of environmental protection is therefore a necessary area of enquiry, especially from a Conceptual Metaphor Theory perspective. The present article explores (1) how the themes of global warming, climate change, pollution and activism are conceptualized in a corpus of 51 noncommercial advertisements, (2) the interaction of metonymy with metaphor, (3) the distribution across verbal and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  22
    Cultural Complexities and their Environment: Investigations of Code–Switching in Contemporary Visual Arts.Zoltán Somhegyi - 2023 - Eidos. A Journal for Philosophy of Culture 7 (2):27-35.
    Contemporary artworks are primary sources for a better understanding of the most important issues in our current reality. The complexities of cultural interactions are often thematized in pieces of art using the artistic means of code-switching, and where the investigation of these questions is pursued in and with regards to the issues of the broader context, including the built and the urban setting. In this paper I examine some aspects of these questions, with the help of some inspiring examples, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  24
    Pistor’s Code of Capital: Wealth Inequality and Legalism About Capital.J. Drake - 2021 - Journal of Business Ethics 181 (3):583-588.
    In The Code of Capital, Katharina Pistor seeks to trace out the ultimate sources of wealth and capital. Her central claim—that wealth and capital are ultimately created by law—is at once more commonsensical and intuitive, on the one hand, and more insightful and provocative, on the other hand, than it might initially seem. At a time when there is deep and widespread interest in and concern about wealth inequality, Pistor argues (successfully, I think) that much inequality can be traced (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  60
    Leaks: How Do Codes of Ethics Address Them?Taegyu Son - 2002 - Journal of Mass Media Ethics 17 (2):155-173.
    In this article I analyze how journalistic codes of ethics in the United States wrestle with the matter of leaks. After assessing how leaks-particularly from government sources-can compromise journalistic independence, I discuss strengths and weakness of ethics codes. Four research questions are explored via a systematic analysis of 47 codes. Although leaks are never explicitly addressed in these codes, the treatment of confidential sources and the need to maintain journalistic independence are addressed.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  46.  12
    The Jewish Cultural Code in the Visual Semiosis of Crimea.Алексеева Е.Н Котляр Е.Р. - 2022 - Philosophy and Culture (Russian Journal) 11:7-29.
    The subject of the study is the cultural code of Judaism in the visual semiosis of the Crimea. The object of the study is the traditional symbolism in the decor of the Jews of the Crimea: Ashkenazi Jews, Karaites and Krymchaks. The article uses the methods of cultural (semiotic, ontological and hermeneutic) analysis in the continuum of signs of the traditional Jewish semiosis, the idiographic method in the concept of the totality of signs, the method of analysis of previous (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  30
    La guerre des codes.Stany Cambot - 2015 - Multitudes 58 (1):137-141.
    Dans la carte des conflits numériques – logiciel libre, open source, théorie de la propriété –Échelle Inconnue relate son expérience de bataille pour le QR-code (encodeur et décodeur libre en ligne, donc gratuit et réalisable par tous) contre le système de « Flash code » payant, érigé comme standard national, commercialisé par Orange. Ce récit, victorieux dans la ville de Rouen, a amené une vingtaine de collectivités territoriales à préférer utiliser le site d’Échelle Inconnue pour élaborer leur (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  25
    Straight to the Sources: Analyzing Elementary Preservice Teacher Planning for Inquiry.Alexa M. Quinn & Alexandria Hakim - 2023 - Journal of Social Studies Research 47 (3-4):210-229.
    Through a multiphase coding process, the researchers examined the selection, characteristics, and planned use of 111 written, visual, oral, and material sources that preservice teachers incorporated into plans for inquiry-based elementary social studies instruction. Preservice teachers identified Google as their main tool for locating potential sources, selected far more secondary than primary sources, and varied widely in how they prepared sources for elementary students. Planned use of sources focused almost entirely on identifying key details, with limited opportunities designed for students (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49. Data-source marking in the Jaqi languages.Martha James Hardman - 1986 - In Wallace L. Chafe & Johanna Nichols, Evidentiality: the linguistic coding of epistemology. Norwood, N.J.: Ablex. pp. 136.
  50. Is the Psychopathic Brain an Artifact of Coding Bias? A Systematic Review.Jarkko Jalava, Stephanie Griffiths, Rasmus Rosenberg Larsen & B. Emma Alcott - 2021 - Frontiers in Psychology 12:654336.
    Questionable research practices are a well-recognized problem in psychology. Coding bias, or the tendency of review studies to disproportionately cite positive findings from original research, has received comparatively little attention. Coding bias is more likely to occur when original research, such as neuroimaging, includes large numbers of effects, and is most concerning in applied contexts. We evaluated coding bias in reviews of structural magnetic resonance imaging (sMRI) studies of PCL-R psychopathy. We used PRISMA guidelines to locate all relevant original sMRI (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 975