A tool for addressing construct identity in literature reviews and meta-analyses
The problem of detecting whether two behavioral constructs reference the same real-world phenomenon has existed for over 100 years. Discordant naming of constructs is here termed the construct identity fallacy (CIF). We designed and evaluated the construct identity detector (CID), the first tool wit...
| Main Authors: | Larsen, Kai Rune T., Bong, Chih How |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Minnesota
2016
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/14236/ http://ir.unimas.my/id/eprint/14236/2/A%20tool%20for%20addressing%20-%20Copy.pdf |
Similar Items
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Property composition and other constructs to support identity in OWL
by: M. Colomb, Robert
Published: (2008)
by: M. Colomb, Robert
Published: (2008)
Approaches in creating meta-requirement: a systematic literature review
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019)
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Address book builder for network monitoring
by: Paraman, Norlina
Published: (2005)
by: Paraman, Norlina
Published: (2005)
Predicting Survey Responses: How and Why Semantics
Shape Survey Statistics on Organizational Behaviour
by: Jan, Ketil Arnulf, et al.
Published: (2014)
by: Jan, Ketil Arnulf, et al.
Published: (2014)
Addressing Constraint Failures in Agent Interaction Protocol
by: Hassan, M.F., et al.
Published: (2009)
by: Hassan, M.F., et al.
Published: (2009)
Information hiding in multimedia files : a literature review
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Sustainable Adoption And Implementation In Collaborative Enterprise: A Systematic Literature Review
by: Jnr, Bokolo Anthony, et al.
Published: (2017)
by: Jnr, Bokolo Anthony, et al.
Published: (2017)
Multi crteria decision making and its applications : a literature review
by: Alias, Mohamad Ashari, et al.
Published: (2008)
by: Alias, Mohamad Ashari, et al.
Published: (2008)
Fuzzy qualitative approach to address uncertainty in human motion analysis / Lim Chern Hong
by: Lim, Chern Hong
Published: (2015)
by: Lim, Chern Hong
Published: (2015)
A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database
by: Alfagi, Abdalrahman, et al.
Published: (2017)
by: Alfagi, Abdalrahman, et al.
Published: (2017)
Software Requirements Prioritisation: A Systematic Literature Review on Significance, Stakeholders, Techniques and Challenges
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
Integrating Scientific Research: Theory and Design of Discovering Similar Constructs
by: Endicott, James, et al.
Published: (2017)
by: Endicott, James, et al.
Published: (2017)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
Automated attendance taker using passive mac address probing
by: Low, Chun Fai
Published: (2018)
by: Low, Chun Fai
Published: (2018)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Artificial intelligence in the United Arab Emirates public sector: A systematic literature review
by: Akhoirshieda, Modafar Shaker, et al.
Published: (2024)
by: Akhoirshieda, Modafar Shaker, et al.
Published: (2024)
Development of a scheduling tool for constructing a Malaysian school timetable using genetic algorithms / Salihin Farag Shoeeb
by: Salihin Farag , Shoeeb
Published: (2003)
by: Salihin Farag , Shoeeb
Published: (2003)
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015)
by: Mall, Dieynaba, et al.
Published: (2015)
Addressing imbalance in health datasets: A new method NR-clustering SMOTE and distance metric modification
by: Hairani, Hairani, et al.
Published: (2025)
by: Hairani, Hairani, et al.
Published: (2025)
A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries
by: Elfaki, Mohamed, et al.
Published: (2019)
by: Elfaki, Mohamed, et al.
Published: (2019)
Green information technology system practice for sustainable collaborative enterprise: A structural literature review
by: Anthony Jr, Bokolo, et al.
Published: (2017)
by: Anthony Jr, Bokolo, et al.
Published: (2017)
Hop-by-Hop Dynamic Addressing Based (H2-DAB) Routing Protocol for Underwater Wireless Sensor Networks
by: Muhammad , Ayaz, et al.
Published: (2009)
by: Muhammad , Ayaz, et al.
Published: (2009)
Generative adversarial networks in object detection: A systematic literature review
by: Anis Farihan, Mat Raffei, et al.
Published: (2025)
by: Anis Farihan, Mat Raffei, et al.
Published: (2025)
A systematic review and meta-analysis of artificial neural network application in geotechnical engineering: theory and applications
by: Moayedi, Hossein, et al.
Published: (2020)
by: Moayedi, Hossein, et al.
Published: (2020)
Preventive and curative personality profiling based on EEG, ERP, and big five personality traits: a literature review
by: Saffiera, Cut Amalia, et al.
Published: (2020)
by: Saffiera, Cut Amalia, et al.
Published: (2020)
Time series predictive analysis based on hybridization of meta-heuristic algorithms
by: Zuriani, Mustaffa, et al.
Published: (2018)
by: Zuriani, Mustaffa, et al.
Published: (2018)
Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
Digital examination question paper maker and analyser / Eng Cheng Kait
by: Eng , Cheng Kait
Published: (2004)
by: Eng , Cheng Kait
Published: (2004)
Systematic Literature Review on Visual Analytics of Predictive
Maintenance in the Manufacturing Industry
by: Cheng, Xiang, et al.
Published: (2022)
by: Cheng, Xiang, et al.
Published: (2022)
Factors Contributing Towards Slow Adoption of Information Technology (IT): A Literature Review
by: Nik Fatma Arisya, Nik Yahya, et al.
Published: (2019)
by: Nik Fatma Arisya, Nik Yahya, et al.
Published: (2019)
The development of semantic meta-database: an ontology based semantic integration of biological databases
by: Samsudin, Ruhaidah, et al.
Published: (2007)
by: Samsudin, Ruhaidah, et al.
Published: (2007)
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
Image tool function
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
The development of ProLysED : an integrated database and meta-server of bacterial protease systems
by: Ahmad, Hafiza Aida
Published: (2007)
by: Ahmad, Hafiza Aida
Published: (2007)
Similar Items
-
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019) -
Property composition and other constructs to support identity in OWL
by: M. Colomb, Robert
Published: (2008) -
Approaches in creating meta-requirement: a systematic literature review
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019) -
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008) -
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)