The Dutch national platform for artistic research organised a day of talks and discussion regarding the topic of ethics, care, and code of conduct for researchers. The introduction laid out several of the key topics and themes for the day, along with the social contexts (#MeToo, BLM, environmental crisis, Corona pandemic, GDPR, and further topics) that make it necessary to explicitly focus on ethics in our work.
DOCUMENT
In recent times, there have been an increase in the concerns about the effectiveness of the traditional business models in achieving sustainable value creation within the global supply chains. The recent scandals suggest the dominant form of maintaining their supply chain’s integrity which largely places some form of liability on the upstream suppliers for social and environmental risks may not be as effective as many scholars and practitioners may have initially conceived. In the light of this, we argue that firms may need to re-evaluate their business models and experiment with a new generations of sustainable business models: the models that call for the direct involvement of networks of stakeholders including suppliers in co-creation of sustainable value. This chapter therefore, seeks to show the processes that a Southern based upstream supplier of big western companies has undertaken in an attempt to create sustainable value. The case study company attempts to do this by developing and implementing a code of conduct based on the combined liability and shared responsibility approach with a network of its direct suppliers. The chapter concludes by drawing implications for sustainable business models within the developing country ’s context.
LINK
Background: Traditionally, research integrity studies have focused on research misbehaviors and their explanations. Over time, attention has shifted towards preventing questionable research practices and promoting responsible ones. However, data on the prevalence of responsible research practices, especially open methods, open codes and open data and their underlying associative factors, remains scarce.Methods: We conducted a web-based anonymized questionnaire, targeting all academic researchers working at or affiliated to a university or university medical center in The Netherlands, to investigate the prevalence and potential explanatory factors of 11 responsible research practices.Results: A total of 6,813 academics completed the survey, the results of which show that prevalence of responsible practices differs substantially across disciplines and ranks, with 99 percent avoiding plagiarism in their work but less than 50 percent pre-registering a research protocol. Arts and humanities scholars as well as PhD candidates and junior researchers engaged less often in responsible research practices. Publication pressure negatively affected responsible practices, while mentoring, scientific norms subscription and funding pressure stimulated them.Conclusions: Understanding the prevalence of responsible research practices across disciplines and ranks, as well as their associated explanatory factors, can help to systematically address disciplinary- and academic rank-specific obstacles, and thereby facilitate responsible conduct of research.
DOCUMENT
This open science checklist is for researchers, trainees and students to assist them in implementing open science in their research activities. The checklist is inspired by open science principles, the Netherlands Code of Conduct for Research Integrity, the REWARD movement and the replicability crisis. It consists of 14 items divided over individual phases of the research process, except items four and five that are more generally applicable. Per item we refer to the corresponding chapter in our Open Science Research Manual and to the corresponding REWARD pillar or article(s) in the Netherlands Code of Conduct for Research Integrity. Some items focus more on quality aspects because sharing materials is most valuable if it is of high quality. Items concerning privacy and research ethics provide the boundary conditions for open science.
DOCUMENT
This method paper presents a template solution for text mining of scientific literature using the R tm package. Literature to be analyzed can be collected manually or automatically using the code provided with this paper. Once the literature is collected, the three steps for conducting text mining can be performed as outlined below:• loading and cleaning of text from articles,• processing, statistical analysis, and clustering, and• presentation of results using generalized and tailor-made visualizations.The text mining steps can be applied to a single, multiple, or time series groups of documents.References are provided to three published peer reviewed articles that use the presented text mining methodology. The main advantages of our method are: (1) Its suitability for both research and educational purposes, (2) Compliance with the Findable Accessible Interoperable and Reproducible (FAIR) principles, and (3) code and example data are made available on GitHub under the open-source Apache V2 license.
DOCUMENT
Abstract-Architecture Compliance Checking (ACC) is useful to bridge the gap between architecture and implementation. ACC is an approach to verify conformance of implemented program code to high-level models of architectural design. Static ACC focuses on the modular software architecture and on the existence of rule violating dependencies between modules. Accurate tool support is essential for effective and efficient ACC. This paper presents a study on the accuracy of ACC tools regarding dependency analysis and violation reporting. Seven tools were tested and compared by means of a custom-made test application. In addition, the code of open source system Freemind was used to compare the tools on the number and precision of reported violation and dependency messages. On the average, 74 percent of 34 dependency types in our custom-made test software were reported, while 69 percent of 109 violating dependencies within a module of Freemind were reported. The test results show large differences between the tools, but all tools could improve the accuracy of the reported dependencies and violations.
DOCUMENT
Background: For patients with coronary artery disease (CAD), smoking is an important risk factor for the recurrence of a cardiovascular event. Motivational interviewing (MI) may increase the motivation of the smokers to stop smoking. Data on MI for smoking cessation in patients with CAD are limited, and the active ingredients and working mechanisms of MI in smoking cessation are largely unknown. Therefore, this study was designed to explore active ingredients and working mechanisms of MI for smoking cessation in smokers with CAD, shortly after a cardiovascular event. Methods: We conducted a qualitative multiple case study of 24 patients with CAD who participated in a randomized trial on lifestyle change. One hundred and nine audio-recorded MI sessions were coded with a combination of the sequential code for observing process exchanges (SCOPE) and the motivational interviewing skill code (MISC). The analysis of the cases consisted of three phases: single case analysis, cross-case analysis, and cross-case synthesis. In a quantitative sequential analysis, we calculated the transition probabilities between the use of MI techniques by the coaches and the subsequent patient statements concerning smoking cessation. Results: In 12 cases, we observed ingredients that appeared to activate the mechanisms of change. Active ingredients were compositions of behaviors of the coaches (e.g., supporting self-efficacy and supporting autonomy) and patient reactions (e.g., in-depth self-exploration and change talk), interacting over large parts of an MI session. The composition of active ingredients differed among cases, as the patient process and the MI-coaching strategy differed. Particularly, change talk and self-efficacy appeared to stimulate the mechanisms of change “arguing oneself into change” and “increasing self-efficacy/confidence.”
DOCUMENT
SUMMARY Architecture compliance checking (ACC) is an approach to verify conformance of implemented program code to high-level models of architec tural design. Static ACC focuses on the modular software architecture and on the existence of rule violating dependencies between modules. Accurate tool support is essential for effective and efficient ACC. This paper presents a study on the accuracy of ACC tools regarding dependency analysis and violation reporting. Ten tools were tested and compare d by means of a custom-made benchmark. The Java code of the benchmark testware contains 34 different types of dependencies, which are based on an inventory of dependency types in object oriented program code. In a second test, the code of open source system FreeMind was used to compare the 10 tools on the number of reported rule violating dependencies and the exactness of the dependency and violation messages. On the average, 77% of the dependencies in our custom-made test software were reported, while 72% of the dependencies within a module of FreeMind were reported. The results show that all tools in the test could improve the accuracy of the reported dependencies and violations, though large differences between the 10 tools were observed. We have identified10 hard-to-detect types of dependencies and four challenges in dependency detection. The relevance of our findings is substantiated by means of a frequency analysis of the hard-to-detect types of dependencies in five open source systems. DOI: 10.1002/spe.2421
DOCUMENT
The knowledge base for Social Work is strengthening. Underpinning of Social Work deriving from scientific research is necessary given the growing complexity of the work and its context. How this research should be conducted and to what type of outcomes it must lead, is part of an ongoing debate. In the Netherlands, practice-based research at Universities of Applied Sciences (UAS) is a relative new approach. Social Work research groups at UAS assert to conduct practice-based research in order to contribute to knowledge and support the objectives of Social Work. The current study was carried out to obtain insight into the characteristics of this research approach. A sample of publications was analysed in terms of knowledge purpose, methodology, and level and type of participation. Results show a strong focus on producing descriptive knowledge and to a lesser extent on control knowledge, using primarily qualitative research methods, and with limited direct participation by stakeholders. In order to practice more what they preach the research can strengthen by doing more empirical research, by diversifying the research in terms of design and methods and increasing the level of participation of stakeholders
DOCUMENT
Abstract-Architecture Compliance Checking (ACC) is an approach to verify the conformance of implemented program code to high-level models of architectural design. ACC is used to prevent architectural erosion during the development and evolution of a software system. Static ACC, based on static software analysis techniques, focuses on the modular architecture and especially on rules constraining the modular elements. A semantically rich modular architecture (SRMA) is expressive and may contain modules with different semantics, like layers and subsystems, constrained by rules of different types. To check the conformance to an SRMA, ACC-tools should support the module and rule types used by the architect. This paper presents requirements regarding SRMA support and an inventory of common module and rule types, on which basis eight commercial and non-commercial tools were tested. The test results show large differences between the tools, but all could improve their support of SRMA, what might contribute to the adoption of ACC in practice.
DOCUMENT