Results 61 to 70 of about 205,649 (344)
Abstract There is currently a gap in knowledge around pupils' growth mindset (GM) and attainment in Scotland, particularly in relation to Socioeconomic Status (SES). This study offers insights on the relevance of growth mindset in Scotland for attainment in mathematics by drawing on large‐scale data from the OECD's Programme for International Student ...
Catherine Reid, Ellen Boeren
wiley +1 more source
“Hacktivists”, “patriotic hackers” and “civilian hackers” are today conducting cyber operations in several armed conflicts. While some of these groups work closely with State armed forces to support their operations and harm the enemy militarily, reports
Tilman Rodenhäuser
doaj +1 more source
A review of McKenzie Wark's A Hacker Manifesto (Harvard University Press, Cambridge, 2005)
Dieter, Michael
core +3 more sources
ABSTRACT The critical role of small and medium‐sized enterprises (SMEs) in driving economic growth through employment generation and innovation cannot go unseen, especially the efforts of small firms in promoting sustainable entrepreneurship. With more market and consumer focus on sustainability and the shift toward eco‐friendly products, SMEs can ...
Nasser Hadi Alajmi
wiley +1 more source
Open to Grok. How do Hackers’ Practices Produce Hackers? [PDF]
How do hackers’ practices produce hackers’ identities? In this paper we argue that the association between science fiction and software programs is rooted in hackers’ practices, defining how hackers’ knowledge’ emerge. The mediation is the one of the Heinlein verb “to grok”, part of the Jargon file and of the name of a code browser, OpenGrok, the ...
D'Andrea, Vincenzo +2 more
openaire +2 more sources
ABSTRACT Tackling sustainability challenges requires coordinated actions across diverse stakeholders. Sustainability‐oriented innovation thus demands networked business models for sustainability (NBMfS), where focal companies and stakeholders co‐create value through interdependent but coordinated roles.
Giovanna Attanasio, Cinzia Battistella
wiley +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Hard and Easy Questions about Consciousness [PDF]
publication-status: PublishedBook chapter from: P. M. S. Hacker, Hans-Johann Glock & John Hyman (eds.), Wittgenstein and Analytic Philosophy: Essays for P.M.S. Hacker. Oxford University Press (2009)N/
Dupré, John
core
A 100-element HBT grid amplifier [PDF]
A 100-element 10-GHz grid amplifier has been developed. The active devices in the grid are chips with heterojunction-bipolar-transistor (HBT) differential pairs.
Chiao, Jung-Chih +8 more
core +1 more source
Asset Redeployability and Biodiversity Risk
ABSTRACT We examine how asset redeployability influences a firm's exposure to biodiversity risk. Our empirical analysis provides robust evidence that firms possessing greater levels of redeployable assets exhibit significantly lower biodiversity risk.
Mostafa Monzur Hasan +2 more
wiley +1 more source

