Results 21 to 30 of about 188,146 (296)
Flexible learning in a partnership context for beginning teachers [PDF]
A preliminary inventory was carried out for a sample of male and female student teachers who had email accounts. Preliminary inventory data revealed that the mean number of times per week that males used email was significantly higher than the mean ...
Hacker, Roger, Sova, Brian
core +2 more sources
The Internet: Where Did IT All Go Wrong?
It is hard to imagine life today without the Internet, and all of the benefits that it brings to our business and personal lives: convenient, cheap and instant communication across time zones and national boundaries; online shopping and banking; document
Robert Schifreen
doaj +1 more source
From cyber-security deception to manipulation and gratification through gamification [PDF]
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss +8 more
core +4 more sources
GOTCHA password hackers! [PDF]
2013 ACM Workshop on Artificial Intelligence and Security (AISec)
Blocki, Jeremiah +2 more
openaire +2 more sources
Security Investment, Hacking, and Information Sharing between Firms and between Hackers
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain.
Kjell Hausken
doaj +1 more source
A review of McKenzie Wark's A Hacker Manifesto (Harvard University Press, Cambridge, 2005)
Dieter, Michael
core +3 more sources
Towards More Robust Nanobioscience: Launching the NanoBubbles Replication Initiative
The NanoBubbles Reproducibility Initiative investigates the robustness of highly cited articles in nanobioscience. Here, we document the process of setting up the initiative from corpus creation to publishing results. We also present platforms that we adopted and challenges that we faced.
Maha Said +2 more
wiley +2 more sources
Thinking with the Animal-Hacker
In the depths of the Cumbria hills a dairy cow changes its route to stare deep into the camera lens of the ‘Environmental Virtual Observatory’ (EVO) (www.evo-uk.org).
Helen Pritchard
doaj +1 more source
Espíritu hacker: empoderando ciudadanos digitales
Abordamos la educación a partir de la perspectiva de los primeros hackers, aquellos apasionados por la programación compartida y el código abierto, pero también de todos los que entienden el conocimiento humano como un bien común.
Nelson De Luca Pretto +2 more
doaj +1 more source
Cybercrime and Digital Transformation
Cyberspace crime is a critical threat to the information security of the state and civil society institutions. Inside global network the abuse of computer user’s trust allows organized criminal groups to achieve their economic and political goals by ...
V. P. Kirilenko, G. V. Alekseev
doaj +1 more source

