Results for ' source code'

956 found
Order:
  1. The Limits of Mathematics.Lisp Source Code - unknown
    In a remarkable development, I have constructed a new definition for a self-delimiting universal Turing machine (UTM) that is easy to program and runs very quickly. This provides a new foundation for algorithmic information theory (AIT), which is the theory of the size in bits of programs for selfdelimiting UTM's. Previously, AIT had an abstract mathematical quality. Now it is possible to write down executable programs that embody the constructions in the proofs of theorems. So AIT goes from dealing with (...)
     
    Export citation  
     
    Bookmark  
  2.  62
    Ethical Sourcing Codes of Large UK-Based Corporations: Prevalence, Content, Limitations.Lutz Preuss - 2009 - Journal of Business Ethics 88 (4):735-747.
    Codes of conduct have become the perhaps most often used tool to manage corporate social responsibility (CSR). Researchers have primarily analysed such documents at company-wide or trans-company levels, whereas there is a dearth of studies into the use of codes for particular corporate functions. Hence, this article will examine one particular group of sub-company level codes, namely codes of conduct that stipulate CSR criteria for suppliers. Examining such ethical sourcing policies adopted by the FTSE100 corporations, the article draws out what (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  3. Source code's video game logic.Warren Buckland - 2014 - In Hollywood puzzle films. New York: Routledge.
     
    Export citation  
     
    Bookmark  
  4.  37
    Free, source-code-available, or proprietary: an ethically charged, context-sensitive choice.Marty J. Wolf, Keith W. Miller & Frances S. Grodzinsky - 2009 - Acm Sigcas Computers and Society 39 (1):15-26.
    We demonstrate that different categories of software raise different ethical concerns with respect to whether software ought to be Free Software or Proprietary Software. We outline the ethical tension between Free Software and Proprietary Software that stems from the two kinds of licenses. For some categories of software we develop support for normative statements regarding the software development landscape. We claim that as society's use of software changes, the ethical analysis for that category of software must necessarily be repeated. Finally, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  7
    Source code obfuscation with genetic algorithms using LLVM code optimizations.Juan Carlos de la Torre, Javier Jareño, José Miguel Aragón-Jurado, Sébastien Varrette & Bernabé Dorronsoro - forthcoming - Logic Journal of the IGPL.
    With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems. If novel paradigm as confidential computing aims at protecting the data manipulated during the execution, obfuscating techniques (in particular at the source code level) remain a popular solution to conceal the purpose of a program or its logic without altering its functionality, thus (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  55
    Commentary on "Loopholes, Gaps, and What is Held Fast".Lorraine Code - 1996 - Philosophy, Psychiatry, and Psychology 3 (4):255-260.
    In lieu of an abstract, here is a brief excerpt of the content:Commentary on “Loopholes, Gaps, and What Is Held Fast”Lorraine Code (bio)Keywordsepistemology, incredulity, knowing other people, memory, testimonyNancy Potter’s compelling essay points to some of the limitations of the theoretical apparatus that the post-positivist empiricist epistemologies of the Anglo-American mainstream make available for evaluating experiential memory claims in general, and “false memory syndrome” in particular. The loopholes and gaps in these theories of knowledge push urgent questions about testimony, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7. Aristotle’s Investigation of a Basic Logical Principle.Alan Code - 1986 - Canadian Journal of Philosophy 16 (3):341-357.
    Aristotle shares with Plato the attitude that the world, ‘the all,’ is a kosmos, a well-ordered and beautiful whole which, as such, can be rendered intelligible, or understood, by the intellect. One understands things, generally speaking, by tracing them back to their sources, origins or principles and causes or explanatory factors, and seeing in what manner they are related to these principles. We know, or understand, a thing when we grasp ‘the why’ or cause. Consequently, understanding is systematic. Some things (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  8.  21
    Lacan’s Cybernetic Theory of Causality: Repetition and the Unconscious in Duncan Jones’ Source Code.Colin Wright - 2018 - In Svitlana Matviyenko & Judith Roof (eds.), Lacan and the Posthuman. Cham: Springer Verlag. pp. 67-88.
    Wright’s chapter outlines how Lacan’s early engagement with cybernetics and game theory informed his psychoanalytic theory of causality. At times, Lacan seems close to a posthumanism avant la lettre in his emphasis on the machinic or combinatorial aspects of the psyche. However, through a Lacanian interpretation of Duncan Jones’ Sci-fi film Source Code —in which the main character’s cyborg status allows for an exploration of posthuman themes—Wright argues that Lacan stresses the temporality of desire and the act in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. Modular spacetime in the "intelligent" blockbuster: Inception and Source code.Allan Cameron & Richard Misek - 2014 - In Warren Buckland (ed.), Hollywood puzzle films. New York: Routledge.
     
    Export citation  
     
    Bookmark  
  10.  6
    Multiple Desirable Methods in Outlier Detection of Univariate Data With R Source Codes.Yuho Shimizu - 2022 - Frontiers in Psychology 12.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  81
    Predictive coding? Yes, but from what source?Gregory Hickok - 2013 - Behavioral and Brain Sciences 36 (4):358-358.
    There is little doubt that predictive coding is an important mechanism in language processing–indeed, in information processing generally. However, it is less clear whether the action system is the source of such predictions during perception. Here I summarize the computational problem with motor prediction for perceptual processes and argue instead for a dual-stream model of predictive coding.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  9
    A source- and channel-coding approach to the analysis and design of languages and ideographies.Mihnea Moldoveanu - 2023 - Behavioral and Brain Sciences 46:e248.
    Can we explain the advantage natural languages enjoy over ideographies in a way that enables us to attempt the design of an ideography that “works”? I deploy an adapted version of Shannon's source- and channel-coding partitioning of a communication system to explain the communicative dynamics and shortfalls of ideographies, and reveal ways in which entrenchable, generalist ideographies could be designed.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  22
    Open Genetic Code: on open source in the life sciences.Eric Deibel - 2014 - Life Sciences, Society and Policy 10 (1):1-23.
    The introduction of open source in the life sciences is increasingly being suggested as an alternative to patenting. This is an alternative, however, that takes its shape at the intersection of the life sciences and informatics. Numerous examples can be identified wherein open source in the life sciences refers to access, sharing and collaboration as informatic practices. This includes open source as an experimental model and as a more sophisticated approach of genetic engineering. The first section discusses (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  19
    Do Programmers Prefer Predictable Expressions in Code?Casey Casalnuovo, Kevin Lee, Hulin Wang, Prem Devanbu & Emily Morgan - 2020 - Cognitive Science 44 (12):e12921.
    Source code is a form of human communication, albeit one where the information shared between the programmers reading and writing the code is constrained by the requirement that the code executes correctly. Programming languages are more syntactically constrained than natural languages, but they are also very expressive, allowing a great many different ways to express even very simple computations. Still, code written by developers is highly predictable, and many programming tools have taken advantage of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  26
    The healing code: 6 minutes to heal the source of any health, success or relationship issue.Alex Loyd - 2010 - Peoria, Ariz.: Intermedia Publishing Group. Edited by Ben Johnson & Jordan Rubin.
    Discover the revolutionary formula that heals the source of illness and disease, even success and relationship issues. Dr. Alex Loyd discovered how to activate a physical function built into the body that consistently and predictably removes this source so that the neuro-immune system takes over its job of healing whatever is wrong in the body. His findings were validated scientifically and by the thousands of people from all over the world who have used The Healing Codes. In this (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  16
    MSDIP: A Method for Coding Source Domains in Metaphor Analysis.W. Gudrun Reijnierse & Christian Burgers - 2023 - Metaphor and Symbol 38 (4):295-310.
    This article describes the Metaphorical Source Domain Identification Procedure (MSDIP), which can be used to code source domains in metaphor identification. In the first part of the article, we describe the complexity of source-domain coding in corpus analysis. We argue that, in many cases, discourse is underspecified and multiple source-domain candidates may be relevant for a specific metaphorical expression. For instance, if a word like “fight” or “target” is used metaphorically, it could refer to either (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  43
    Code as speech: A discussion of Bernstein V. USDOJ, karn V. USDOS, and junger V. Daley in light of the U.s. Supreme court's recent shift to federalism. [REVIEW]Jean Camp & K. Lewis - 2001 - Ethics and Information Technology 3 (1):21-33.
    The purpose of this paper is to address the question of whethercomputer source code is speech protected by the First Amendmentto the United States Constitution or whether it is merelyfunctional, a ``machine'', designed to fulfill a set task andtherefore bereft of protection. The answer to this question is acomplex one. Unlike all other forms of ``speech'' computer sourcecode holds a unique place in the law: it can be copyrighted, likea book and it can be patented like a machine (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  18.  73
    The impact of ethics code familiarity on manager behavior.Thomas R. Wotruba, Lawrence B. Chonko & Terry W. Loe - 2000 - Journal of Business Ethics 33 (1):59 - 69.
    Codes of ethics exist in many, if not the majority, of all large U.S. companies today. But how the impact of these written codes affect managerial attitudes and behavior is still not clearly documented or explained. This study takes a step in that direction by proposing that attention should shift from the codes themselves as the sources of ethical behavior to the persons whose behavior is the focus of these codes. In particular, this study investigates the role of code (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   54 citations  
  19.  7
    Coding theorems of information theory.Jacob Wolfowitz - 1961 - Englewood Cliffs, N.J.,: Prentice-Hall.
    The objective of the present edition of this monograph is the same as that of earlier editions, namely, to provide readers with some mathemati cal maturity a rigorous and modern introduction to the ideas and principal theorems of probabilistic information theory. It is not necessary that readers have any prior knowledge whatever of information theory. The rapid development of the subject has had the consequence that any one book can now cover only a fraction of the literature. The latter is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  26
    Processing of snoRNAs as a new source of regulatory non‐coding RNAs.Marina Falaleeva & Stefan Stamm - 2013 - Bioessays 35 (1):46-54.
    Recent experimental evidence suggests that most of the genome is transcribed into non‐coding RNAs. The initial transcripts undergo further processing generating shorter, metabolically stable RNAs with diverse functions. Small nucleolar RNAs (snoRNAs) are non‐coding RNAs that modify rRNAs, tRNAs, and snRNAs that were considered stable. We review evidence that snoRNAs undergo further processing. High‐throughput sequencing and RNase protection experiments showed widespread expression of snoRNA fragments, known as snoRNA‐derived RNAs (sdRNAs). Some sdRNAs resemble miRNAs, these can associate with argonaute proteins and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  21.  69
    Ethical codes in the digital world: Comparisons of the proprietary, the open/free and the cracker system. [REVIEW]Jukka Vuorinen - 2007 - Ethics and Information Technology 9 (1):27-38.
    The digital world provides various ethical frames for individuals to become ethical subjects. In this paper I examine – in a Foucauldian and Luhmannian way – the differences between three systems of communication: the proprietary, the open/free and the cracker system. It is argued that all three systems provide a different set of ethical codes which one can be subjected to. The language of each system is restricted and they cannot understand each other, they merely consider each other as the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  18
    Coding Freedom: The Ethics and Aesthetics of Hacking.E. Gabriella Coleman - 2012 - Princeton University Press.
    Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software movement in the United States and Europe, Coding Freedom details the ethics behind hackers' devotion to F/OSS, the social codes that guide its production, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  23.  15
    Universal coding and prediction on ergodic random points.Łukasz Dębowski & Tomasz Steifer - 2022 - Bulletin of Symbolic Logic 28 (3):387-412.
    Suppose that we have a method which estimates the conditional probabilities of some unknown stochastic source and we use it to guess which of the outcomes will happen. We want to make a correct guess as often as it is possible. What estimators are good for this? In this work, we consider estimators given by a familiar notion of universal coding for stationary ergodic measures, while working in the framework of algorithmic randomness, i.e., we are particularly interested in prediction (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  6
    Journalistic codes of ethics in the CSCE countries: an examination.Pauli Juusela - 1991 - Tampere: University of Tampere, Dept. of Journalism and Mass Communication.
    A study examined the journalistic codes of ethics from 23 countries involved in the Conference on Security and Cooperation in Europe (CSCE), using descriptive and interpretative content analysis. The contents of the 24 codes from the 23 countries were divided into explicit categories on the basis of a 17-part classification scheme, including: "truth, ""acquisition of facts, ""professional secrecy, ""freedom of information, ""professional integrity, ""human rights," and "values." Results indicated that: (1) the most important principle in all the codes was represented (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  16
    An Open-Source Cognitive Test Battery to Assess Human Attention and Memory.Maxime Adolphe, Masataka Sawayama, Denis Maurel, Alexandra Delmas, Pierre-Yves Oudeyer & Hélène Sauzéon - 2022 - Frontiers in Psychology 13.
    Cognitive test batteries are widely used in diverse research fields, such as cognitive training, cognitive disorder assessment, or brain mechanism understanding. Although they need flexibility according to their usage objectives, most test batteries are not available as open-source software and are not be tuned by researchers in detail. The present study introduces an open-source cognitive test battery to assess attention and memory, using a javascript library, p5.js. Because of the ubiquitous nature of dynamic attention in our daily lives, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  69
    Open Sourcing Normative Assumptions on Privacy and Other Moral Values in Blockchain Applications.Georgy Ishmaev - 2019 - Dissertation, Delft University of Technology
    The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such technological determinism, however, hardly provides insights of sufficient depth on the moral significance of blockchain technology. This thesis argues rather, that very much like the cryptographic tools before them, blockchains develop in a (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  58
    Ethical Codes in Sports Organizations: Classification Framework, Content Analysis, and the Influence of Content on Code Effectiveness.Els De Waegeneer, Jeroen Van De Sompele & Annick Willem - 2016 - Journal of Business Ethics 136 (3):587-598.
    Sports organizations face various ethical challenges. To tackle these, ethical codes are becoming increasingly popular instruments. However, a lot of questions remain concerning their effectiveness. There is a particular lack of knowledge when it comes to their form and content, and on the influence of these features on the effectiveness of these codes of ethics. Therefore, we developed a framework to analyze ethical codes and used this to assess codes of ethics in sports clubs from six disciplines. The form and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  28.  40
    Harnessing Multidimensional Legitimacy for Codes of Ethics: A Staged Approach.Hugh Breakey - 2019 - Journal of Business Ethics 170 (2):359-373.
    How can codes of ethics acquire legitimacy—that is, how can they lay down obligations that will be seen by their subjects as morally binding? There are many answers to this question, reflecting the fact that moral agents have a host of different bases on which they may acknowledge code duties as ethically binding—or, alternatively, may reject those duties as morally irrelevant or actively corrupt. Drawing on a wide literature on legitimacy in other practical fields, this paper develops a multidimensional (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  13
    Code Red for Humanity: Multimodal Metaphor and Metonymy in Noncommercial Advertisements on Environmental Awareness and Activism.Laura Hidalgo-Downing & Niamh A. O’Dowd - 2023 - Metaphor and Symbol 38 (3):231-253.
    Concern for global warming, climate change and pollution has grown in recent years, with countries across the world facing natural disasters on unprecedented scales. The communication of environmental protection is therefore a necessary area of enquiry, especially from a Conceptual Metaphor Theory perspective. The present article explores (1) how the themes of global warming, climate change, pollution and activism are conceptualized in a corpus of 51 noncommercial advertisements, (2) the interaction of metonymy with metaphor, (3) the distribution across verbal and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  10
    Code, coding and coded perspectives.L. Jean Camp - 2003 - Journal of Information, Communication and Ethics in Society 1 (1):49-60.
    I begin with a discussion of code and its primary types: embedded, source, binary and interpreted. I then consider three measures in which code is fundamentally different than print. In particular I speak of the trust inherent in connectivity, the organizational difficulties of information, and the problem of archiving information that may change rapidly. Following each of these explanations I offer my own hypotheses about how code and ubiquitous digital media might alter society and the sensibilities (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  20
    The future of ppen source software: Let the market decide.R. A. Spinello - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):217-233.
    According to its supporters open source software is more secure and reliable than proprietary code, and even tends to foster more innovation. Its technical superiority can be linked to the ongoing peer review process which typifies the open source model. In addition, programs such as Linux offer a potential challenge to the hegemony of Microsoft. Open source holds out the possibility of restraining platform leaders such as Microsoft from acting opportunistically. Some even argue that the open (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  32. ‘Genetic Coding’ Reconsidered : An Analysis of Actual Usage.Ulrich E. Stegmann - 2016 - British Journal for the Philosophy of Science 67 (3):707-730.
    This article reconsiders the theoretical role of the genetic code. By drawing on published and unpublished sources from the 1950s, I analyse how the code metaphor was actually employed by the scientists who first promoted its use. The analysis shows that the term ‘code’ picked out mechanism sketches, consisting of more or less detailed descriptions of ordinary molecular components, processes, and structural properties of the mechanism of protein synthesis. The sketches provided how-possibly explanations for the ordering of (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  33. Supply Chain Specific? Understanding the Patchy Success of Ethical Sourcing Initiatives.Sarah Roberts - 2003 - Journal of Business Ethics 44 (2/3):159 - 170.
    As a number of high profile companies have found to their cost, corporate reputations can be significantly affected by firms' management of sustainability issue, including those that are outside their direct control, such as the environmental and social impacts of their supply networks. This paper begins by examining the relationship between corporate social responsibility, reputation, and supply network conditions. It then looks at the effectiveness of one tool for managing supply network sustainability issues, ethical sourcing codes of conduct, by examining (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   63 citations  
  34.  23
    A parametric, resource-bounded generalization of löb’s theorem, and a robust cooperation criterion for open-source game theory.Andrew Critch - 2019 - Journal of Symbolic Logic 84 (4):1368-1381.
    This article presents two theorems: a generalization of Löb’s Theorem that applies to formal proof systems operating with bounded computational resources, such as formal verification software or theorem provers, and a theorem on the robust cooperation of agents that employ proofs about one another’s source code as unexploitable criteria for cooperation. The latter illustrates a capacity for outperforming classical Nash equilibria and correlated equilibria, attaining mutually cooperative program equilibrium in the Prisoner’s Dilemma while remaining unexploitable, i.e., sometimes achieving (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. The Idea of Code in Contextualism and Minimalism.Jakub Mácha - 2012 - Organon F: Medzinárodný Časopis Pre Analytickú Filozofiu 19 (suppl. 1):116-136.
    In this paper I discuss the idea of a semantic code in the contemporary debate between contextualism and minimalism. First, I identify historical sources of these positions in Grice’s pragmatics and in Davidson’s theory of meaning in order to sketch the role of a semantic code there. Then I argue that contextualism is committed to the idea of an ad hoc code, while minimalism involves a persistent code. However, the latter approach to a code requires (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  35
    Research Data and Code for "Interdisciplinarity in the 17th Century? A Co-Occurrence Analysis of Early Modern German Dissertation Titles".Stefan Heßbrüggen-Walter - unknown
    This dataset documents results and code for the paper "Interdisciplinarity in the 17th Century? A Co-Occurrence Analysis of Early Modern German Dissertation Titles" by Stefan Heßbrüggen-Walter, forthcoming in *Synthese*. The data to be processed are contained in four files, derived from a larger dataset related to German dissertations and sourced from the national bibliography of 17th century German prints *VD 17* that will be released at a later date. More information can be found in the file `README.md`.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  12
    The Jewish Cultural Code in the Visual Semiosis of Crimea.Алексеева Е.Н Котляр Е.Р. - 2022 - Philosophy and Culture (Russian Journal) 11:7-29.
    The subject of the study is the cultural code of Judaism in the visual semiosis of the Crimea. The object of the study is the traditional symbolism in the decor of the Jews of the Crimea: Ashkenazi Jews, Karaites and Krymchaks. The article uses the methods of cultural (semiotic, ontological and hermeneutic) analysis in the continuum of signs of the traditional Jewish semiosis, the idiographic method in the concept of the totality of signs, the method of analysis of previous (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  95
    The effectiveness of corporate codes of ethics.Steven Weller - 1988 - Journal of Business Ethics 7 (5):389 - 395.
    While the focus on business ethics is increasing in business school curricula, there has been little systematic scholarly research on the forces which bring about ethical behavior. This article is intended as a first step toward that research by creating a catalogue of hypotheses concerning the efficacy of corporate codes of ethics. The hypotheses are drawn from studies of compliance with law and court decisions and theories of legitimacy, authority, public policy making and individual behavior. Hypotheses are proposed based on (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  39. The Non-Coding RNA Ontology : a comprehensive resource for the unification of non-coding RNA biology.Huang Jingshan, Eilbeck Karen, Barry Smith, A. Blake Judith, Dou Dejing, Huang Weili, A. Natale Darren, Ruttenberg Alan, Huan Jun & T. Zimmermann Michael - 2016 - Journal of Biomedical Semantics 7 (1).
    In recent years, sequencing technologies have enabled the identification of a wide range of non-coding RNAs (ncRNAs). Unfortunately, annotation and integration of ncRNA data has lagged behind their identification. Given the large quantity of information being obtained in this area, there emerges an urgent need to integrate what is being discovered by a broad range of relevant communities. To this end, the Non-Coding RNA Ontology (NCRO) is being developed to provide a systematically structured and precisely defined controlled vocabulary for the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  86
    Ethical Codes in Sports Organizations: Classification Framework, Content Analysis, and the Influence of Content on Code Effectiveness.Annick Willem, Jeroen Sompele & Els Waegeneer - 2016 - Journal of Business Ethics 136 (3):587-598.
    Sports organizations face various ethical challenges. To tackle these, ethical codes are becoming increasingly popular instruments. However, a lot of questions remain concerning their effectiveness. There is a particular lack of knowledge when it comes to their form and content, and on the influence of these features on the effectiveness of these codes of ethics. Therefore, we developed a framework to analyze ethical codes and used this to assess codes of ethics in sports clubs from six disciplines. The form and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  59
    Leaks: How Do Codes of Ethics Address Them?Taegyu Son - 2002 - Journal of Mass Media Ethics 17 (2):155-173.
    In this article I analyze how journalistic codes of ethics in the United States wrestle with the matter of leaks. After assessing how leaks-particularly from government sources-can compromise journalistic independence, I discuss strengths and weakness of ethics codes. Four research questions are explored via a systematic analysis of 47 codes. Although leaks are never explicitly addressed in these codes, the treatment of confidential sources and the need to maintain journalistic independence are addressed.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  42.  24
    Pistor’s Code of Capital: Wealth Inequality and Legalism About Capital.J. Drake - 2021 - Journal of Business Ethics 181 (3):583-588.
    In The Code of Capital, Katharina Pistor seeks to trace out the ultimate sources of wealth and capital. Her central claim—that wealth and capital are ultimately created by law—is at once more commonsensical and intuitive, on the one hand, and more insightful and provocative, on the other hand, than it might initially seem. At a time when there is deep and widespread interest in and concern about wealth inequality, Pistor argues (successfully, I think) that much inequality can be traced (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43. Universal Moral Values for Corporate Codes of Ethics.Mark S. Schwartz - 2005 - Journal of Business Ethics 59 (1-2):27-44.
    How can one establish if a corporate code of ethics is ethical in terms of its content? One important first step might be the establishment of core universal moral values by which corporate codes of ethics can be ethically constructed and evaluated. Following a review of normative research on corporate codes of ethics, a set of universal moral values is generated by considering three sources: (1) corporate codes of ethics; (2) global codes of ethics; and (3) the business ethics (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   67 citations  
  44. A Kantian approach to codes of ethics.Jacquie L'Etang - 1992 - Journal of Business Ethics 11 (10):737 - 744.
    The paper discusses whether codes of ethics are Kantian notions through an analysis of their intention and structure. The article also discusses some of the ideas put forward by William Starr in his article, Codes of Ethics — Towards a Rule-Utilitarian Justification,Journal of Business Ethics 2(2) (May 1983).The paper refers to recent definitions of codes of ethics and considers reasons for the proliferation of such codes. It examines the moral justification for these codes and analyses the underlying ethical theory particularly (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  45.  19
    Cultural Complexities and their Environment: Investigations of Code–Switching in Contemporary Visual Arts.Zoltán Somhegyi - 2023 - Eidos. A Journal for Philosophy of Culture 7 (2):27-35.
    Contemporary artworks are primary sources for a better understanding of the most important issues in our current reality. The complexities of cultural interactions are often thematized in pieces of art using the artistic means of code-switching, and where the investigation of these questions is pursued in and with regards to the issues of the broader context, including the built and the urban setting. In this paper I examine some aspects of these questions, with the help of some inspiring examples, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  42
    The Cut and Paste Society: Isomorphism in Codes of Ethics. [REVIEW]Lori Holder-Webb & Jeffrey Cohen - 2012 - Journal of Business Ethics 107 (4):485-509.
    Regulatory responses to the business failures of 1998–2001 framed them as a general failure of governance and ethics rather than as firm-specific problems. Among the regulatory responses are Section 406 of Sarbanes–Oxley Act, SEC, and exchange requirements to provide a Code of Ethics. However, institutional pressures surrounding this regulation suggest the potential for symbolic responses and decoupling of response from organizational action. In this article, we examine Codes of Ethics for a stratified sample of 75 U.S. firms across five (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  47.  43
    The Open-Source Everything Manifesto: Transparency, Truth, and Trust by Robert David Steele.Martin Paul Eve - 2016 - Utopian Studies 27 (1):121-124.
    What is there not to like about “openness”? The premise seems to have virtue, particularly in the space of critique of government. From totalitarianism through to oligarchies, it can be argued that it is opacity and secrecy that have contributed to abuses of power for many centuries. In other spaces, the notion has caught hold. In several scientific fields, it appears that a lack of openness can lead to misconduct and in some cases a slowness that may cost lives. In (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  24
    Straight to the Sources: Analyzing Elementary Preservice Teacher Planning for Inquiry.Alexa M. Quinn & Alexandria Hakim - 2023 - Journal of Social Studies Research 47 (3-4):210-229.
    Through a multiphase coding process, the researchers examined the selection, characteristics, and planned use of 111 written, visual, oral, and material sources that preservice teachers incorporated into plans for inquiry-based elementary social studies instruction. Preservice teachers identified Google as their main tool for locating potential sources, selected far more secondary than primary sources, and varied widely in how they prepared sources for elementary students. Planned use of sources focused almost entirely on identifying key details, with limited opportunities designed for students (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  67
    Ethics in sports journalism: Tightening up the code.K. Tim Wulfemeyer - 1985 - Journal of Mass Media Ethics 1 (1):57 – 67.
    Many Americans don't hold journalists in very high regard these days, and sports journalists are often viewed in the least favorable light. The general public does not perceive any visible, unified, and concerted effort among sportswriters to practice their craft in a consistently ethical manner. Efforts to upgrade the craft include the Associated Press Sports Editors ethical guidelines, which cover freebies, moonlighting, community involvement by sports journalists, and commercial sponsors of sporting events. This study examines the APSE code and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  11
    The Nexus Between Sources of Workers’ Power in the Garment Manufacturing Industries of Lesotho and Eswatini.Søren Jeppesen & Andries Bezuidenhout - 2024 - Journal of Business Ethics 195 (2):283-298.
    Workers in the garment manufacturing industry are often subjected to violations of their rights and are exposed to low wages and difficult working conditions. In response to the exposure of these violations in the media, major fashion brands and retailers subject their suppliers to labour codes of conduct. Despite these codes of conduct being largely ineffective, this comparative case study of garment manufacturers operating from Lesotho and Eswatini illustrates that such codes provide workers and trade unions with access to bargaining (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 956