Results 61 to 70 of about 205,649 (344)

Growth mindset is positively associated with mathematics attainment in Scotland—But socioeconomic status plays a greater role

open access: yesBritish Educational Research Journal, EarlyView.
Abstract There is currently a gap in knowledge around pupils' growth mindset (GM) and attainment in Scotland, particularly in relation to Socioeconomic Status (SES). This study offers insights on the relevance of growth mindset in Scotland for attainment in mathematics by drawing on large‐scale data from the OECD's Programme for International Student ...
Catherine Reid, Ellen Boeren
wiley   +1 more source

Civilian hackers in war: The limits that international humanitarian law imposes on volunteer IT armies, hacktivists, and other civilian hackers

open access: yesInternational Review of the Red Cross
“Hacktivists”, “patriotic hackers” and “civilian hackers” are today conducting cyber operations in several armed conflicts. While some of these groups work closely with State armed forces to support their operations and harm the enemy militarily, reports
Tilman Rodenhäuser
doaj   +1 more source

Hack the System! [PDF]

open access: yes, 2013
A review of McKenzie Wark's A Hacker Manifesto (Harvard University Press, Cambridge, 2005)
Dieter, Michael
core   +3 more sources

Resource‐Centered Transformation Paths: The Role of Digital Transformation in Optimizing SME Resources for Sustainable Entrepreneurship

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The critical role of small and medium‐sized enterprises (SMEs) in driving economic growth through employment generation and innovation cannot go unseen, especially the efforts of small firms in promoting sustainable entrepreneurship. With more market and consumer focus on sustainability and the shift toward eco‐friendly products, SMEs can ...
Nasser Hadi Alajmi
wiley   +1 more source

Open to Grok. How do Hackers’ Practices Produce Hackers? [PDF]

open access: yes, 2008
How do hackers’ practices produce hackers’ identities? In this paper we argue that the association between science fiction and software programs is rooted in hackers’ practices, defining how hackers’ knowledge’ emerge. The mediation is the one of the Heinlein verb “to grok”, part of the Jargon file and of the name of a code browser, OpenGrok, the ...
D'Andrea, Vincenzo   +2 more
openaire   +2 more sources

Synchronising Stakeholder Roles: How Do Stakeholders Actively and Dynamically Shape Networked Business Models for Sustainability?

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Tackling sustainability challenges requires coordinated actions across diverse stakeholders. Sustainability‐oriented innovation thus demands networked business models for sustainability (NBMfS), where focal companies and stakeholders co‐create value through interdependent but coordinated roles.
Giovanna Attanasio, Cinzia Battistella
wiley   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Hard and Easy Questions about Consciousness [PDF]

open access: yes, 2014
publication-status: PublishedBook chapter from: P. M. S. Hacker, Hans-Johann Glock & John Hyman (eds.), Wittgenstein and Analytic Philosophy: Essays for P.M.S. Hacker. Oxford University Press (2009)N/
Dupré, John
core  

A 100-element HBT grid amplifier [PDF]

open access: yes, 1993
A 100-element 10-GHz grid amplifier has been developed. The active devices in the grid are chips with heterojunction-bipolar-transistor (HBT) differential pairs.
Chiao, Jung-Chih   +8 more
core   +1 more source

Asset Redeployability and Biodiversity Risk

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT We examine how asset redeployability influences a firm's exposure to biodiversity risk. Our empirical analysis provides robust evidence that firms possessing greater levels of redeployable assets exhibit significantly lower biodiversity risk.
Mostafa Monzur Hasan   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy