Results 61 to 70 of about 188,146 (296)
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source
Ce que le “Libre” fait aux “libristes”
The development of personal computing has transformed how its technicians are perceived. However, despite the appearance of an abundant literature on hacker “culture”, they remain largely invisible from the viewpoint of their social insertions.
Gael Depoorter
doaj +1 more source
Is the Private Language Argument a Transcendental Argument? [PDF]
Comparisons between Kant´s critique of pure reason and Wittgenstein´s critique of language, which became current in analytic philosophy (Cf. e.g Hacker 1972, 30.) seem not far-fetched in view of the impetus for the destruction of dogmatic metaphysics ...
Mom, Karel
core
Open to Grok. How do Hackers’ Practices Produce Hackers? [PDF]
How do hackers’ practices produce hackers’ identities? In this paper we argue that the association between science fiction and software programs is rooted in hackers’ practices, defining how hackers’ knowledge’ emerge. The mediation is the one of the Heinlein verb “to grok”, part of the Jargon file and of the name of a code browser, OpenGrok, the ...
D'Andrea, Vincenzo +2 more
openaire +2 more sources
Waiting for a Release: The Expectation in Virtual Gaming Communities
ABSTRACT This study examines how virtual gaming communities influence and maintain player expectations before, during, and after a game's release. A mixed‐methods study was conducted, comprising a netnography followed by an experiment. First, a netnographic study was conducted over 12 months, tracking communities to understand player behavior and ...
Lucas Lopes Ferreira de Souza +4 more
wiley +1 more source
The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in investment in new technology for ...
Robert Ramirez, Nazli Choucri
doaj +1 more source
ABSTRACT This research analyses the carbon footprint of the NGO Madre Coraje, using an integrated methodology that combines the calculator provided by REAS (Red de Economía Alternativa y Solidaria) Navarra and the Life Cycle Assessment (LCA). It quantifies emissions across the three scopes of the Greenhouse Gas Protocol, evaluating both direct and ...
José Fernandez‐Serrano +2 more
wiley +1 more source
The addition of Na2CO3 or K2CO3 to sewage sludge prior to combustion leads to the production of ashes containing phosphate in the form of buchwaldite‐like phases (Ca(Na/K)PO4). Compared to conventional sewage sludge mono‐ashes, such Na‐ or K‐ashes show greatly increased P‐solubilities and proved to be potent P‐fertiliser materials in greenhouse ...
Lorenz Bier‐Schorr +4 more
wiley +1 more source
The Role of Hackers in Countering Surveillance and Promoting Democracy
Practices related to media technologies and infrastructures (MTI) are an increasingly important part of democratic constellations in general and of surveillance tactics in particular. This article does not seek to discuss surveillance per se, but instead
Sebastian Kubitschko
doaj +1 more source
Neo-Aristotelian Naturalism and the Evolutionary Objection: Rethinking the Relevance of Empirical Science [PDF]
Neo-Aristotelian metaethical naturalism is a modern attempt at naturalizing ethics using ideas from Aristotle’s teleological metaphysics. Proponents of this view argue that moral virtue in human beings is an instance of natural goodness, a kind of ...
C Andreou +32 more
core +1 more source

