Results 21 to 30 of about 188,146 (296)

Flexible learning in a partnership context for beginning teachers [PDF]

open access: yes, 1998
A preliminary inventory was carried out for a sample of male and female student teachers who had email accounts. Preliminary inventory data revealed that the mean number of times per week that males used email was significantly higher than the mean ...
Hacker, Roger, Sova, Brian
core   +2 more sources

The Internet: Where Did IT All Go Wrong?

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2008
It is hard to imagine life today without the Internet, and all of the benefits that it brings to our business and personal lives: convenient, cheap and instant communication across time zones and national boundaries; online shopping and banking; document
Robert Schifreen
doaj   +1 more source

From cyber-security deception to manipulation and gratification through gamification [PDF]

open access: yes, 2019
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss   +8 more
core   +4 more sources

GOTCHA password hackers! [PDF]

open access: yesProceedings of the 2013 ACM workshop on Artificial intelligence and security, 2013
2013 ACM Workshop on Artificial Intelligence and Security (AISec)
Blocki, Jeremiah   +2 more
openaire   +2 more sources

Security Investment, Hacking, and Information Sharing between Firms and between Hackers

open access: yesGames, 2017
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain.
Kjell Hausken
doaj   +1 more source

Hack the System! [PDF]

open access: yes, 2013
A review of McKenzie Wark's A Hacker Manifesto (Harvard University Press, Cambridge, 2005)
Dieter, Michael
core   +3 more sources

Towards More Robust Nanobioscience: Launching the NanoBubbles Replication Initiative

open access: yesAngewandte Chemie, EarlyView.
The NanoBubbles Reproducibility Initiative investigates the robustness of highly cited articles in nanobioscience. Here, we document the process of setting up the initiative from corpus creation to publishing results. We also present platforms that we adopted and challenges that we faced.
Maha Said   +2 more
wiley   +2 more sources

Thinking with the Animal-Hacker

open access: yesA Peer-Reviewed Journal About, 2013
In the depths of the Cumbria hills a dairy cow changes its route to stare deep into the camera lens of the ‘Environmental Virtual Observatory’ (EVO) (www.evo-uk.org).
Helen Pritchard
doaj   +1 more source

Espíritu hacker: empoderando ciudadanos digitales

open access: yesEdutec, 2022
Abordamos la educación a partir de la perspectiva de los primeros hackers, aquellos apasionados por la programación compartida y el código abierto, pero también de todos los que entienden el conocimiento humano como un bien común.
Nelson De Luca Pretto   +2 more
doaj   +1 more source

Cybercrime and Digital Transformation

open access: yesТеоретическая и прикладная юриспруденция, 2021
Cyberspace crime is a critical threat to the information security of the state and civil society institutions. Inside global network the abuse of computer user’s trust allows organized criminal groups to achieve their economic and political goals by ...
V. P. Kirilenko, G. V. Alekseev
doaj   +1 more source

Home - About - Disclaimer - Privacy