Results 61 to 70 of about 188,146 (296)

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Ce que le “Libre” fait aux “libristes”

open access: yesRecherches Sociologiques et Anthropologiques, 2015
The development of personal computing has transformed how its technicians are perceived. However, despite the appearance of an abundant literature on hacker “culture”, they remain largely invisible from the viewpoint of their social insertions.
Gael Depoorter
doaj   +1 more source

Is the Private Language Argument a Transcendental Argument? [PDF]

open access: yes, 2002
Comparisons between Kant´s critique of pure reason and Wittgenstein´s critique of language, which became current in analytic philosophy (Cf. e.g Hacker 1972, 30.) seem not far-fetched in view of the impetus for the destruction of dogmatic metaphysics ...
Mom, Karel
core  

Open to Grok. How do Hackers’ Practices Produce Hackers? [PDF]

open access: yes, 2008
How do hackers’ practices produce hackers’ identities? In this paper we argue that the association between science fiction and software programs is rooted in hackers’ practices, defining how hackers’ knowledge’ emerge. The mediation is the one of the Heinlein verb “to grok”, part of the Jargon file and of the name of a code browser, OpenGrok, the ...
D'Andrea, Vincenzo   +2 more
openaire   +2 more sources

Waiting for a Release: The Expectation in Virtual Gaming Communities

open access: yesJournal of Consumer Behaviour, EarlyView.
ABSTRACT This study examines how virtual gaming communities influence and maintain player expectations before, during, and after a game's release. A mixed‐methods study was conducted, comprising a netnography followed by an experiment. First, a netnographic study was conducted over 12 months, tracking communities to understand player behavior and ...
Lucas Lopes Ferreira de Souza   +4 more
wiley   +1 more source

Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review

open access: yesIEEE Access, 2016
The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in investment in new technology for ...
Robert Ramirez, Nazli Choucri
doaj   +1 more source

A Social Entrepreneurship Perspective of De‐Carbonising the Footprint through Recycling Compensation: A Case Study of the NGO Madre Coraje

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This research analyses the carbon footprint of the NGO Madre Coraje, using an integrated methodology that combines the calculator provided by REAS (Red de Economía Alternativa y Solidaria) Navarra and the Life Cycle Assessment (LCA). It quantifies emissions across the three scopes of the Greenhouse Gas Protocol, evaluating both direct and ...
José Fernandez‐Serrano   +2 more
wiley   +1 more source

Enhancement of the Plant‐Accessible Phosphate Fraction in Sewage Sludge Ashes by Na+ or K+ Addition Prior to Combustion

open access: yesChemSusChem, Volume 18, Issue 6, March 15, 2025.
The addition of Na2CO3 or K2CO3 to sewage sludge prior to combustion leads to the production of ashes containing phosphate in the form of buchwaldite‐like phases (Ca(Na/K)PO4). Compared to conventional sewage sludge mono‐ashes, such Na‐ or K‐ashes show greatly increased P‐solubilities and proved to be potent P‐fertiliser materials in greenhouse ...
Lorenz Bier‐Schorr   +4 more
wiley   +1 more source

The Role of Hackers in Countering Surveillance and Promoting Democracy

open access: yesMedia and Communication, 2015
Practices related to media technologies and infrastructures (MTI) are an increasingly important part of democratic constellations in general and of surveillance tactics in particular. This article does not seek to discuss surveillance per se, but instead
Sebastian Kubitschko
doaj   +1 more source

Neo-Aristotelian Naturalism and the Evolutionary Objection: Rethinking the Relevance of Empirical Science [PDF]

open access: yes, 2018
Neo-Aristotelian metaethical naturalism is a modern attempt at naturalizing ethics using ideas from Aristotle’s teleological metaphysics. Proponents of this view argue that moral virtue in human beings is an instance of natural goodness, a kind of ...
C Andreou   +32 more
core   +1 more source

Home - About - Disclaimer - Privacy