Results 1 to 10 of about 151,972 (175)
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses
Zoran Cekerevac +3 more
doaj +3 more sources
Disabled Sex Workers’ Fight for Digital Rights, Platform Accessibility, and Design Justice
Internet technologies are an increasingly necessary tool for sex working people, disabled people, and people who hold both identities to access resources, community, and income, as well as make claims to rights and fight for social justice.
Emily Coombes +3 more
doaj +1 more source
Grass-roots entrepreneurship complements traditional top-down innovation in lung and breast cancer
The majority of biomedical research is funded by public, governmental, and philanthropic grants. These initiatives often shape the avenues and scope of research across disease areas.
Khalil B. Ramadi +6 more
doaj +1 more source
Rapid crowdsourced innovation for COVID-19 response and economic growth
The COVID-19 pandemic has profoundly affected life worldwide. Governments have been faced with the formidable task of implementing public health measures, such as social distancing, quarantines, and lockdowns, while simultaneously supporting a sluggish ...
Khalil B. Ramadi, Freddy T. Nguyen
doaj +1 more source
Abstract This essay outlines how the ‘hack’ might offer a model for anthropological research in the face of the distributed relations evidenced by digital data. The argument builds on fieldwork with citizens and activists and looks at their attempts to understand and make use of the data produced by energy sensors and monitors ...
openaire +2 more sources
Construindo tipos: o caso de abusos contra crianças [PDF]
A ideia explícita de abuso de crianças surgiu num momento definido (1961) e num lugar específico (Denver) a partir das discussões de algumas pessoas com autoridade sobre a questão (pediatras).
Ian Hacking
doaj +1 more source
Unspeakably more depends on what things are called than on what they are
This article examines a particular relationship between names and things. Initially examines the tradition that treats this issue in the history of philosophy especially those who criticize the universalist that tries to put human beings into a nature ...
Ian Hacking
doaj +1 more source
The Impacts of Ethical Hacking and its Security Mechanisms
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes.
Hafiz Burhan Ul Haq +6 more
doaj +1 more source
Big little lies: a compendium and simulation of p-hacking strategies
In many research fields, the widespread use of questionable research practices has jeopardized the credibility of scientific results. One of the most prominent questionable research practices is p-hacking. Typically, p-hacking is defined as a compound of
Angelika M. Stefan, Felix D. Schönbrodt
doaj +1 more source
We argue that perception, priming, and cognition research utilize the tools of stage magic in problematic ways, engaging in what we call "surprise-hacking." Surprise-hacking consists of the pre-experimental planning and staging of counterintuitive and negative results (such as blindness, bias, and irrationality).
Felin, T +3 more
openaire +2 more sources

