scholarly journals Justification of Argumentation Schemes

Author(s):  
Douglas Walton

Argumentation schemes are forms of argument that capture stereotypical patterns of human reasoning, especially defeasible ones like argument from expert opinion, that have proved troublesome to view deductively or inductively. Much practical work has already been done on argumentation schemes, proving their worth in A1 [19], but more precise investigations are needed to formalize their structures. The problem posed in this paper is what form justification of a given scheme, as having a certain precise structure of inference, should take. It is argued that defeasible argumentation schemes require both a systematic and a pragmatic justification, of a kind that can only be provided by the case study method of collecting key examples of arguments of the types traditionally classified as fallacies, and subjecting them to comparative examination and analysis. By this method, postulated structures for schemes can be formulated as hypotheses to solve three kinds of problems: (1) how to classify such arguments into different types, (2) how to identify their premises and conclusions, and (3) how to formulate the critical questions used to evaluate each type of argument.

2019 ◽  
Vol 31 (3) ◽  
pp. 451-471 ◽  
Author(s):  
Karina Kenk ◽  
Toomas Haldma

Purpose The purpose of this paper is to study more deeply the use of performance information (PI) in the context of the administrative-territorial reform, e.g. amalgamation in the local governments (LG) with an example of Estonian LGs. Design/methodology/approach The case study method is adopted, using data from publicly available documents and interviews with the politicians and officials at the five merger cases of Estonian LG units. The data are interpreted and analysed using attribution theory. Findings The results show that amalgamation patterns do have an influence on PI use – in particular, the authors see that PI is reported to be used more frequently in cases of voluntary mergers, which may be related to the different motivations to make attributions in cases of voluntary and compulsory mergers. Originality/value The study contributes to the debate on the importance and usefulness of different types of PI, as financial as well as non-financial information and for different information users in the light of LG reform in Estonia as being a Central and Eastern European country.


Author(s):  
Douglas Walton

This paper surveys the state-of-the-art of argumentation schemes used as argument extraction techniques in cognitive informatics and uses examples to show how a series of connected problems needs to be solved to move these techniques forward to computational implementation. Some of the schemes considered are argument from expert opinion, practical reasoning, argument from negative consequences, fear appeal arguments, argument from commitment, argument from inconsistent commitments, and the circumstantial ad hominem argument. The paper shows how schemes need to be formed into clusters of sub-schemes work toward a classification system of schemes from the bottom up, and how identification conditions for each scheme can be helpful for argument extraction.


2019 ◽  
Vol 32 (3) ◽  
pp. 247-263 ◽  
Author(s):  
Linda Höglund ◽  
Maria Mårtensson ◽  
Aswo Safari

Purpose The purpose of this paper is to study how different types of trust develop and change over time in the collaboration between an organization and its board. Design/methodology/approach This paper is a response to a recent call to apply the concept of trust in understanding the collaboration between a public organization, its board, and other stakeholders. Here, the authors study a single case, and based on a longitudinal in-depth case study method covering the period of 2003–2015, the authors have conducted 27 interviews, including the CEO and all the board members. Findings The authors introduce and advance the concept of trust in the public sector literature on board work. This paper shows that trust is complex and multidimensional at different units of analysis. The types of trust discussed in this paper are cognitive, affective, contractual, competence, and goodwill. Different types of trust are developed to make the collaboration between a governed organization and its board to work. Research limitations/implications Because this paper uses the case study method and only studies one single case, the findings of this paper might be questioned on the issue of generalization. Originality/value The authors conceptualize and adopt trust as a multidimensional, dynamic concept, and with different units of analyses, capture the nature of the collaboration between a public organization and its board, and its complexity.


2021 ◽  
Vol 16 (4) ◽  
pp. 114-121
Author(s):  
Pasiutsina Yuliya N. ◽  

The article investigates the case-technology as a means of increasing students’ motivation for reading, the significance of innovative method used in Literature Courses and the importance of the personality of the teacher are determined. The author analyzes this method, its structure, the terms of application, the necessary stages, considers those skills and abilities that are actualized with its help in the process of studying the teaching material, emphasizes that they are universal, thus, should be applied in all spheres of life, including professional. For solving these tasks an attempt is made to create a series of cases on the topic “The Life and Works of J. R. R. Tolkien. “The Hobbit, or There and Back Again”. The proposed cases include different types and forms of work in the classroom: the preparation of a presentation, the public speech, a route, an excursion, a project, a review of a given problem, etc. The objective of this work is to interest students, to reveal their creative potential, to teach them to think, to reason, to draw conclusions, to compare information, and, what is a priority, to involve them in reading fiction. The class based on the case study method is of interest to school teachers and university lecturers. The material can be used not only directly in the classroom in literature classes, but also at extracurricular activities, that will help to diversify the educational process and achieve the necessary educational results. Keywords: reading, case-technology, case, methodology, J. R. R. Tolkien, fairy-story, fantasy


2018 ◽  
Vol 1 (2) ◽  
pp. 1-17
Author(s):  
Tedi Budiman

One example of the growing information technology today is mobile learning, mobile learning which refers to mobile technology as a learning medium. Mobile learning is learning that is unique for each student to access learning materials anywhere, anytime. Mobile learning is suitable as a model of learning for the students to make it easier to get an understanding of a given subject, such as math is pretty complicated and always using formulas.The design method that I use is the case study method, namely, learning, searching and collecting data related to the study. While the development of engineering design software application programs that will be used by the author is the method of Rapid Application Development (RAD), which consists of 4 stages: Requirements Planning Phase, User Design Phase, Construction Phase and Phase Cotuver.


2020 ◽  
Vol 11 (3) ◽  
pp. 21-32
Author(s):  
Faiqua Tahjiba

Objectives: The aim of this study was to investigate the actual condition of the students of University of Rajshahi (RU) regarding drug abuse and addiction. Using case study method the research was conducted with four objectives: (a) to find out how respondents began drug abuse; (b) to discover the causes of their drug addiction; (c) to understand the process of their drug abuse; and (d) to find out the economic, social and health effects of drug abuse. Methods: Case study method was used in this research. Through snowball sampling 18 drug- addicted students of RU were selected as respondents. In-depth interview with a schedule was used to collect data from the respondents in January 2019. Results: Findings of the study show that the causes of drug addiction included curiosity, frustration, friends’ request, neglect from family and friends etc. The drugs which they usually abused were Yaba, Phensydyle, Ganja (Weed), Chuani etc. Their average monthly expenditure for collecting drugs was in between Taka 8,000-10,000. They collected those drugs from rickshaw pullers at different points within the campus and from Mizaner Mor, Budhpara slum and other places outside the campus. The respondents opined that drugs were available if sufficient money could be spent. The respondents had senior and junior fellow students and local boys as companions while taking drugs. Most of them faced physical problems after taking drugs, and some of them tried to get rid of this curse of drug addiction. Conclusion: The findings of this research show that the rate of drug addiction among the students of RU was quite alarming. Therefore, all stakeholders including the students, guardians, teachers, university authority, the law makers and law enforcing agencies, researchers, civil society, NGO’s and the state must come forward together to combat this formidable foe.


2020 ◽  
Vol 24 (1) ◽  
Author(s):  
Nfn Darmanto ◽  
Nur Zaini

AbstrakPenelitian ini dilatarbelakangi oleh menguatnya wacana mengenai pentingnya perlindungan data pribadi  dan terbitnya Peraturan Menteri Komunikasi dan Informatika Nomor 20 Tahun 2016 tentang Perlindungan Data Pribadi dalam Sistem Elektronik. Adapun tujuan penelitian adalah untuk mengetahui kinerja implementasi Peraturan Menteri tersebut di lingkungan Pemerintah Kabupaten. Penelitian  dilakukan di Dinas Kependudukan dan Pencatatan Sipil pada Pemerintah Kabupaten Gianyar, Temanggung, dan Sleman dengan menggunakan metode studi kasus, sedangkan pengum­pu­lan data menggunakan teknik studi pustaka, wawancara, dan observasi. Pembahasan dilakukan dengan menggunakan konsep implemen­tasi model Edwards yang melihat implementasi berdasarkan variabel komunikasi, sumber-sumber, kecenderungan-kecenderu­ngan, dan struk­tur birokrasi. Hasil penelitian menunjuk­kan bahwa penyelenggaraan administrasi kependudukan yang di dalamnya termasuk perlindungan data pribadi oleh Dinas Kependudukan dan Pencatatan Sipil merujuk pada Peraturan Menteri Dalam Negeri Nomor 61 Tahun 2015, sedangkan Peraturan Menteri Komunikasi dan Informatika Nomor 20 tahun 2016 sama sekali belum mereka ketahui. AbstractThis research is motivated by the strengthening of discourse regarding the importance of protecting personal data and the issuance of Minister of Communication and Information Regulation No. 20 of 2016 concerning Protection of Personal Data in Electronic Systems. The research objective is to determine the performance of the implementation of the Ministerial Regulation within the District Government. The study was conducted at the Department of Population and Civil Registration at the Government of the Regency of Gianyar, Temanggung, and Sleman by using a case study method, while data collection using literature study techniques, interviews, and observations. The discussion was carried out using the concept of implementation of Edwards model that looked at implementation based on communication variables, sources, trends, and bureaucratic structure. The results showed that the administration of population administration which included the protection of personal data by the Population and Civil Registry Office referred to the Minister of Home Affairs Regulation No. 61 of 2015, while the Minister of Communication and Information Regulation No. 20 of 2016 was completely unknown to them.   


2017 ◽  
Vol 1 (1) ◽  
pp. 196-204
Author(s):  
Sulistiawati Sulistiawati

This research is intended to search and information about the strengthening of Islamic religious education (PAI) through the recitation of furudhul Ainiyah which is carried out in Nurul Jadid Paiton Junior High School. The method of this research is by qualitative method with case study method, to express. That is more intense and deep with the above phenomenon. Technique of completion of data and information is done through interview, observation, study study, and literature study. The findings of this research are 1). Students or students are required to complete the recitation of Furudhul Ainiyah as a condition to take the odd semester and even semester exam and become a requirement for class and graduation increase. 2). the implementation of the furudhul Ainiyah memorization is performed on Thursday and Friday nights and Tuesday nights, and can also be done during normal day breaks, 3). The responsible and recipient of the rote deposit are PAI teachers and their homeroom teachers, 4). For students and students who can not read written Al-qur'an is not subject to rote burden, but get special coaching related to Al-Qur'an reading written by the religious coordinator of students. 5). Memory materials include Aqidah, Fiqih or Amaliyah materials, and daily prayers for students of VII and VIII semerter 1 and 2, while for classes IX semesters 1 and 2 cover the material of the Qur'an and Fiqh. 6). (a). Principal, (b). Vice Principal of the curriculum section, (c). Coordinator of students' religious activities, (d). Teacher / teacher of PAI, (e). Homeroom, (e). Student religious coordinator, (f). Student.


2017 ◽  
Vol 1 (1) ◽  
pp. 1-16
Author(s):  
John Harner ◽  
Lee Cerveny ◽  
Rebecca Gronewold

Natural resource managers need up-to-date information about how people interact with public lands and the meanings these places hold for use in planning and decision-making. This case study explains the use of public participatory Geographic Information System (GIS) to generate and analyze spatial patterns of the uses and values people hold for the Browns Canyon National Monument in Colorado. Participants drew on maps and answered questions at both live community meetings and online sessions to develop a series of maps showing detailed responses to different types of resource uses and landscape values. Results can be disaggregated by interaction types, different meaningful values, respondent characteristics, seasonality, or frequency of visit. The study was a test for the Bureau of Land Management and US Forest Service, who jointly manage the monument as they prepare their land management plan. If the information generated is as helpful throughout the entire planning process as initial responses seem, this protocol could become a component of the Bureau’s planning tool kit.


Sign in / Sign up

Export Citation Format

Share Document